Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FORTUNE RICH_PARTICULARS.pdf.scr.exe

Overview

General Information

Sample name:FORTUNE RICH_PARTICULARS.pdf.scr.exe
Analysis ID:1585108
MD5:4947f452082bd2777d7dc32cf51035e5
SHA1:ad1303c43216936b3e8b11de5083697db2620e20
SHA256:b2f88cb8f154ac5d65ea6625caa29220d585c1934e5ef696439ce17dae8d0cfa
Tags:exeuser-threatcat_ch
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
{"EXfil Mode": "SMTP", "From": "hubservices@navecepa.com", "Password": "yiwLgN*rC4", "Server": "smtp.navecepa.com", "To": "COMPUTERNAME", "Port": 971342}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xf061:$a1: get_encryptedPassword
        • 0xf389:$a2: get_encryptedUsername
        • 0xedea:$a3: get_timePasswordChanged
        • 0xef0b:$a4: get_passwordField
        • 0xf077:$a5: set_encryptedPassword
        • 0x109dc:$a7: get_logins
        • 0x1068d:$a8: GetOutlookPasswords
        • 0x1047f:$a9: StartKeylogger
        • 0x1092c:$a10: KeyLoggerEventArgs
        • 0x104dc:$a11: KeyLoggerEventArgsEventHandler
        00000002.00000002.2901912977.0000000002604000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 12 entries
          SourceRuleDescriptionAuthorStrings
          2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xf261:$a1: get_encryptedPassword
                • 0xf589:$a2: get_encryptedUsername
                • 0xefea:$a3: get_timePasswordChanged
                • 0xf10b:$a4: get_passwordField
                • 0xf277:$a5: set_encryptedPassword
                • 0x10bdc:$a7: get_logins
                • 0x1088d:$a8: GetOutlookPasswords
                • 0x1067f:$a9: StartKeylogger
                • 0x10b2c:$a10: KeyLoggerEventArgs
                • 0x106dc:$a11: KeyLoggerEventArgsEventHandler
                2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x142b3:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x137b1:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x13abf:$a4: \Orbitum\User Data\Default\Login Data
                • 0x148b7:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 20 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-07T05:02:57.257162+010028032742Potentially Bad Traffic192.168.2.449732158.101.44.24280TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeAvira: detected
                Source: 00000002.00000002.2901912977.00000000024E1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "hubservices@navecepa.com", "Password": "yiwLgN*rC4", "Server": "smtp.navecepa.com", "To": "COMPUTERNAME", "Port": 971342}
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeReversingLabs: Detection: 18%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49733 version: TLS 1.0
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Stubs Fully\Public\Public Runpe\PR\PR\obj\Debug\Poses.pdb source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660681628.00000000028E1000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 4x nop then jmp 00A98922h2_2_00A98508
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 4x nop then jmp 00A981F9h2_2_00A97F48
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 4x nop then jmp 00A98922h2_2_00A9884F
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 4x nop then jmp 00A9FAF8h2_2_00A9F7F8
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49732 -> 158.101.44.242:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49733 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmp, FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.00000000024E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.00000000024E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000257B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000257B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.00000000024E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmp, FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660201986.0000000000CE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wdcp.microsoft.
                Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode

                System Summary

                barindex
                Source: 2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7428, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7524, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: initial sampleStatic PE information: Filename: FORTUNE RICH_PARTICULARS.pdf.scr.exe
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 0_2_00BEE0840_2_00BEE084
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 0_2_073C17870_2_073C1787
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A9AC082_2_00A9AC08
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A9F1282_2_00A9F128
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A97F482_2_00A97F48
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A9E4022_2_00A9E402
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A9E7702_2_00A9E770
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A9ABF82_2_00A9ABF8
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A92DD12_2_00A92DD1
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A9EF082_2_00A9EF08
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A9F7F82_2_00A9F7F8
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A97F372_2_00A97F37
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000000.1648152401.00000000004A6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePop.exe( vs FORTUNE RICH_PARTICULARS.pdf.scr.exe
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1659905835.0000000000C1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs FORTUNE RICH_PARTICULARS.pdf.scr.exe
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVebinace.dll2 vs FORTUNE RICH_PARTICULARS.pdf.scr.exe
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs FORTUNE RICH_PARTICULARS.pdf.scr.exe
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660681628.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePoses.dll, vs FORTUNE RICH_PARTICULARS.pdf.scr.exe
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660681628.000000000295B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePoses.dll, vs FORTUNE RICH_PARTICULARS.pdf.scr.exe
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660681628.000000000295B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs FORTUNE RICH_PARTICULARS.pdf.scr.exe
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2900884309.000000000052A000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs FORTUNE RICH_PARTICULARS.pdf.scr.exe
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2900851693.00000000004F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs FORTUNE RICH_PARTICULARS.pdf.scr.exe
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeBinary or memory string: OriginalFilenamePop.exe( vs FORTUNE RICH_PARTICULARS.pdf.scr.exe
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7428, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7524, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, Form1.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, AirFilter.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, AirFilter.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, EngineBlock.csSuspicious method names: .EngineBlock.FuelInjectionType
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.InjectorType
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.AreInjectorsClogged
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.InjectorDutyCycle
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.InjectorFlowRate
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.InjectorType
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.AreInjectorsClogged
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.InjectorDutyCycle
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.InjectorFlowRate
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, EngineBlock.csSuspicious method names: .EngineBlock.FuelInjectionType
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FORTUNE RICH_PARTICULARS.pdf.scr.exe.logJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeMutant created: NULL
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.00000000025BF000.00000004.00000800.00020000.00000000.sdmp, FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.00000000025DD000.00000004.00000800.00020000.00000000.sdmp, FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.00000000025CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeReversingLabs: Detection: 18%
                Source: unknownProcess created: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe "C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe"
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess created: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe "C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe"
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess created: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe "C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Stubs Fully\Public\Public Runpe\PR\PR\obj\Debug\Poses.pdb source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660681628.00000000028E1000.00000004.00000800.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, Form1.cs.Net Code: Form1_Load System.Reflection.Assembly.Load(byte[])
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, Form1.cs.Net Code: Form1_Load
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeStatic PE information: 0x87DDA81E [Wed Mar 26 12:44:14 2042 UTC]
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A938AF push eax; retf 0070h2_2_00A938EA
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A938EF push eax; retf 0070h2_2_00A938FA
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A938FF push eax; retf 0070h2_2_00A9390A
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A93862 push eax; retf 0070h2_2_00A938EA
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A9387F push eax; retf 0070h2_2_00A938EA
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A9387F push eax; retf 0070h2_2_00A938FA
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exeStatic PE information: section name: .text entropy: 7.72014595747216

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: Possible double extension: pdf.scrStatic PE information: FORTUNE RICH_PARTICULARS.pdf.scr.exe
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeMemory allocated: BE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeMemory allocated: 28E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeMemory allocated: 2680000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeMemory allocated: A90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeMemory allocated: 24E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeMemory allocated: 22F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe TID: 7448Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901360604.00000000007B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeCode function: 2_2_00A9F128 LdrInitializeThunk,LdrInitializeThunk,2_2_00A9F128
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.294f3f0.1.raw.unpack, EngineAlgorithm.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.294f3f0.1.raw.unpack, EngineAlgorithm.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                Source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeProcess created: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe "C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7428, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7524, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7428, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7524, type: MEMORYSTR
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2901912977.0000000002604000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7428, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7524, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7428, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7524, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.510000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.397e220.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.393d1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.FORTUNE RICH_PARTICULARS.pdf.scr.exe.3913380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7428, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FORTUNE RICH_PARTICULARS.pdf.scr.exe PID: 7524, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                11
                Process Injection
                11
                Masquerading
                1
                OS Credential Dumping
                1
                Query Registry
                Remote Services1
                Email Collection
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                1
                Input Capture
                1
                Security Software Discovery
                Remote Desktop Protocol1
                Input Capture
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares11
                Archive Collected Data
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Process Injection
                NTDS31
                Virtualization/Sandbox Evasion
                Distributed Component Object Model1
                Data from Local System
                13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts13
                Obfuscated Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                DLL Side-Loading
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                FORTUNE RICH_PARTICULARS.pdf.scr.exe18%ReversingLabs
                FORTUNE RICH_PARTICULARS.pdf.scr.exe100%AviraHEUR/AGEN.1306813
                FORTUNE RICH_PARTICULARS.pdf.scr.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://wdcp.microsoft.0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                188.114.97.3
                truefalse
                  high
                  checkip.dyndns.com
                  158.101.44.242
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://reallyfreegeoip.org/xml/8.46.123.189false
                        high
                        http://checkip.dyndns.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.apache.org/licenses/LICENSE-2.0FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designersGFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designers/?FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/bTheFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers?FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://reallyfreegeoip.orgdFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000257B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.tiro.comFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmp, FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.00000000024E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designersFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.goodfont.co.krFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.carterandcone.comlFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.sajatypeworks.comFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.typography.netDFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.fontbureau.com/designers/cabarga.htmlNFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.founder.com.cn/cn/cTheFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.galapagosdesign.com/staff/dennis.htmFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.founder.com.cn/cnFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.fontbureau.com/designers/frere-user.htmlFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://reallyfreegeoip.org/xml/8.46.123.189lFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://checkip.dyndns.comdFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://checkip.dyndns.org/qFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.jiyu-kobo.co.jp/FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://reallyfreegeoip.org/xml/8.46.123.189dFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://wdcp.microsoft.FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660201986.0000000000CE7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://reallyfreegeoip.orgFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000257B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://checkip.dyndns.orgdFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.galapagosdesign.com/DPleaseFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://reallyfreegeoip.orgFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://www.fontbureau.com/designers8FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.fonts.comFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.sandoll.co.krFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://checkip.dyndns.comFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://www.urwpp.deDPleaseFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://www.zhongyicts.com.cnFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://checkip.dyndns.org/dFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.00000000024E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://www.sakkal.comFORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1661578423.0000000006902000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://api.telegram.org/bot-/sendDocument?chat_id=FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://reallyfreegeoip.org/xml/FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2901912977.000000000255F000.00000004.00000800.00020000.00000000.sdmp, FORTUNE RICH_PARTICULARS.pdf.scr.exe, 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        • No. of IPs < 25%
                                                                                                        • 25% < No. of IPs < 50%
                                                                                                        • 50% < No. of IPs < 75%
                                                                                                        • 75% < No. of IPs
                                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                                        188.114.97.3
                                                                                                        reallyfreegeoip.orgEuropean Union
                                                                                                        13335CLOUDFLARENETUSfalse
                                                                                                        158.101.44.242
                                                                                                        checkip.dyndns.comUnited States
                                                                                                        31898ORACLE-BMC-31898USfalse
                                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                                        Analysis ID:1585108
                                                                                                        Start date and time:2025-01-07 05:02:05 +01:00
                                                                                                        Joe Sandbox product:CloudBasic
                                                                                                        Overall analysis duration:0h 5m 2s
                                                                                                        Hypervisor based Inspection enabled:false
                                                                                                        Report type:full
                                                                                                        Cookbook file name:default.jbs
                                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                        Number of analysed new started processes analysed:7
                                                                                                        Number of new started drivers analysed:0
                                                                                                        Number of existing processes analysed:0
                                                                                                        Number of existing drivers analysed:0
                                                                                                        Number of injected processes analysed:0
                                                                                                        Technologies:
                                                                                                        • HCA enabled
                                                                                                        • EGA enabled
                                                                                                        • AMSI enabled
                                                                                                        Analysis Mode:default
                                                                                                        Analysis stop reason:Timeout
                                                                                                        Sample name:FORTUNE RICH_PARTICULARS.pdf.scr.exe
                                                                                                        Detection:MAL
                                                                                                        Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                                                                                                        EGA Information:
                                                                                                        • Successful, ratio: 100%
                                                                                                        HCA Information:
                                                                                                        • Successful, ratio: 99%
                                                                                                        • Number of executed functions: 25
                                                                                                        • Number of non-executed functions: 2
                                                                                                        Cookbook Comments:
                                                                                                        • Found application associated with file extension: .exe
                                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                        • Excluded IPs from analysis (whitelisted): 184.28.90.27, 4.245.163.56, 13.107.246.45
                                                                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                        No simulations
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        188.114.97.3Order Inquiry.exeGet hashmaliciousFormBookBrowse
                                                                                                        • www.cifasnc.info/8rr3/
                                                                                                        Gg6wivFINd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                        • unasnetds.ru/eternalPython_RequestUpdateprocessAuthSqlTrafficTemporary.php
                                                                                                        Payment Receipt.exeGet hashmaliciousFormBookBrowse
                                                                                                        • www.cifasnc.info/8rr3/
                                                                                                        dGhlYXB0Z3JvdXA=-free.exeGet hashmaliciousUnknownBrowse
                                                                                                        • /api/get/free
                                                                                                        dGhlYXB0Z3JvdXA=-free.exeGet hashmaliciousUnknownBrowse
                                                                                                        • /api/get/free
                                                                                                        RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                                                                        • www.rgenerousrs.store/o362/
                                                                                                        A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                                        • www.beylikduzu616161.xyz/2nga/
                                                                                                        Delivery_Notification_00000260791.doc.jsGet hashmaliciousUnknownBrowse
                                                                                                        • radostdetym.ru/?ad=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN&id=rWoA9pTQhV1o4c5fjbOa-d26BGh3QU3-Bk0PqI4WnzM-5vl4IqKPymhrqkRpunF_PTHktMR-2qUlNAtnXA&rnd=45
                                                                                                        ce.vbsGet hashmaliciousUnknownBrowse
                                                                                                        • paste.ee/d/lxvbq
                                                                                                        Label_00000852555.doc.jsGet hashmaliciousUnknownBrowse
                                                                                                        • tamilandth.com/counter/?ad=1GNktTwWR98eDEMovFNDqyUPsyEdCxKRzC&id=LWkA9pJQhl9uXU1kaDN-eSC-55GNxzVDsLXZhtXL8Pr1j1FTCf4XAYGxA0VCjCQra2XwotFrDHGSYxM&rnd=25
                                                                                                        158.101.44.242fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        PO#5_Tower_049.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        PO_4027_from_IC_Tech_Inc_6908.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        ZOYGRL1ePa.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        Requested Documentation.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        reallyfreegeoip.orgdocument pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.96.3
                                                                                                        fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.96.3
                                                                                                        yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.96.3
                                                                                                        kP8EgMorTr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        PO#5_Tower_049.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                        • 188.114.96.3
                                                                                                        W2k2NLSvja.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        FACT0987789000900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.96.3
                                                                                                        PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                        • 104.21.67.152
                                                                                                        checkip.dyndns.comdocument pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 158.101.44.242
                                                                                                        yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 158.101.44.242
                                                                                                        kP8EgMorTr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        PO#5_Tower_049.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                        • 158.101.44.242
                                                                                                        W2k2NLSvja.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        FACT0987789000900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        CLOUDFLARENETUShttps://report-scam.malwarebouncer.com/XcUR2TnV2VTlXT0s0Z0NYa01KSGt3dUtWMWNiblBrc29mMlpZUU1WdThBSjdDdTlRQTVDV1ZZd0pDeWRmUU5rQ1QvVDNiSlBNYWd2bTd0eTRkZW5jT0hrYTBKWHFiVUc4TVZBOGpiNkh4VG9OTm9zNTVUWHNmNWVydHpqbzhIc1llSzdzTHZ0dENVNWRLZy9BbCsyVDRMSGRHOThUWnV5QUxPU0RZL1dPalNYTmUzMTVoRzl5bmk1ZVZRPT0tLUdVYnJkMC9GazI3MWlxYmotLUpFOURyOWkzK1l6Vy9BYTVOVDBVNkE9PQ==?cid=2346401253Get hashmaliciousKnowBe4Browse
                                                                                                        • 104.17.25.14
                                                                                                        x86_64.elfGet hashmaliciousMiraiBrowse
                                                                                                        • 8.44.60.50
                                                                                                        sh4.elfGet hashmaliciousMiraiBrowse
                                                                                                        • 162.158.206.216
                                                                                                        w3245.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 104.21.80.52
                                                                                                        w3245.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 104.21.80.52
                                                                                                        https://bs32c.golfercaps.com/vfd23ced/#sean@virtualintelligencebriefing.comGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 188.114.96.3
                                                                                                        https://app.saner.ai/shared/notes/7353e5ae-dd5f-410b-92c3-210c9e88052aGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 104.17.247.203
                                                                                                        https://solve.jrqr.org/awjxs.captcha?u=df8172c9-2ab6-423b-8c92-85669127a20aGet hashmaliciousUnknownBrowse
                                                                                                        • 104.21.27.98
                                                                                                        Jeffparish.docxGet hashmaliciousUnknownBrowse
                                                                                                        • 104.17.24.14
                                                                                                        https://u43161309.ct.sendgrid.net/ls/click?upn=u001.L9-2FCbhkaoUACh7As3yZ8i4iABGphfl-2FJgS6Xiu1aw6I-3DgXpA_qO4VbBWAKg4gLfGs-2BfuSyZki3gKzG4I1DrYN15Q8fD7JV1twLeLo1AFs1GBSG3ZgA22dFJdXJloKc56aXDeV3olJKTBJd8NprednZ2LeXdX-2BkcSQE-2F2FRwgBng5RbUCLfjS8-2FI3mrpwyYu9lRatIB62qUwPSax-2Fhh2c7R-2B7pT3Kos0wK0SEJGj4ZMkgOGYhEniKYT7Kn7jN25xFz2sFdtPlVQkIdCFKwDNWmq-2BrAxerZE2GuKgfkuf3l1UY4J42sOOltybAAVyLhV-2BXfmbuQpN4NpshXRIuhta8ho3ChcTA5NtgjludQThyLtwhGns-2ByLqSbpO1Bhhc-2FCgdgP-2BAOxYrGHvKHjVYRr6-2BiryADxfM-3DGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 104.18.86.42
                                                                                                        ORACLE-BMC-31898USfiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 158.101.44.242
                                                                                                        PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 158.101.44.242
                                                                                                        Fantazy.i686.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 193.123.7.176
                                                                                                        fuckunix.spc.elfGet hashmaliciousMiraiBrowse
                                                                                                        • 144.25.181.0
                                                                                                        PO#5_Tower_049.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                        • 158.101.44.242
                                                                                                        test.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 130.61.86.87
                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 193.122.130.0
                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • 158.101.44.242
                                                                                                        PO_4027_from_IC_Tech_Inc_6908.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 158.101.44.242
                                                                                                        image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 193.122.130.0
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        54328bd36c14bd82ddaa0c04b25ed9addocument pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        kP8EgMorTr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        PO#5_Tower_049.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        adguardInstaller.exeGet hashmaliciousPureLog StealerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        W2k2NLSvja.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        FACT0987789000900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        No context
                                                                                                        Process:C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe
                                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):1119
                                                                                                        Entropy (8bit):5.345080863654519
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                                                                                                        MD5:88593431AEF401417595E7A00FE86E5F
                                                                                                        SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                                                                                                        SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                                                                                                        SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                                                                                                        Malicious:true
                                                                                                        Reputation:moderate, very likely benign file
                                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                        Entropy (8bit):7.711127862952333
                                                                                                        TrID:
                                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                        • DOS Executable Generic (2002/1) 0.01%
                                                                                                        File name:FORTUNE RICH_PARTICULARS.pdf.scr.exe
                                                                                                        File size:222'720 bytes
                                                                                                        MD5:4947f452082bd2777d7dc32cf51035e5
                                                                                                        SHA1:ad1303c43216936b3e8b11de5083697db2620e20
                                                                                                        SHA256:b2f88cb8f154ac5d65ea6625caa29220d585c1934e5ef696439ce17dae8d0cfa
                                                                                                        SHA512:7eee4f1b8f276c9d41878e463a60fc48cd82d8c632dba3f48a71b7f767236e4f2678704627633ce9dbc49a238019f0f36b682145bcdede591fa7951535fc937e
                                                                                                        SSDEEP:3072:+rIOgeLRN9KkUFBlFdXcowGj8VJx72TJEJ2WTi56q51vb4:+rIOgelGrfgGjQJ2km
                                                                                                        TLSH:9824E6153795412DE569EEB894510BC22FBFBB1EA02F770C7B0CE466F6892CD0582A1F
                                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0......6.......L... ...`....@.. ....................................@................................
                                                                                                        Icon Hash:13d1421995c6490d
                                                                                                        Entrypoint:0x434c2e
                                                                                                        Entrypoint Section:.text
                                                                                                        Digitally signed:false
                                                                                                        Imagebase:0x400000
                                                                                                        Subsystem:windows gui
                                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                        Time Stamp:0x87DDA81E [Wed Mar 26 12:44:14 2042 UTC]
                                                                                                        TLS Callbacks:
                                                                                                        CLR (.Net) Version:
                                                                                                        OS Version Major:4
                                                                                                        OS Version Minor:0
                                                                                                        File Version Major:4
                                                                                                        File Version Minor:0
                                                                                                        Subsystem Version Major:4
                                                                                                        Subsystem Version Minor:0
                                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                        Instruction
                                                                                                        jmp dword ptr [00402000h]
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x34bd40x57.text
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x360000x33b0.rsrc
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x3a0000xc.reloc
                                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                        .text0x20000x32c340x32e003b9eddf807a5be8e6fccea8ee271a090False0.669605152027027data7.72014595747216IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                        .rsrc0x360000x33b00x3400136a6ce04816fdd601cebdcbc9c13296False0.9194711538461539data7.703187088905528IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .reloc0x3a0000xc0x200185220484a2493883cc0809e078e637aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                        RT_ICON0x361300x2d91PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9799399914273468
                                                                                                        RT_GROUP_ICON0x38ec40x14data0.95
                                                                                                        RT_VERSION0x38ed80x2ecdata0.4344919786096257
                                                                                                        RT_MANIFEST0x391c40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                        DLLImport
                                                                                                        mscoree.dll_CorExeMain
                                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                        2025-01-07T05:02:57.257162+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449732158.101.44.24280TCP
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Jan 7, 2025 05:02:56.108685017 CET4973280192.168.2.4158.101.44.242
                                                                                                        Jan 7, 2025 05:02:56.113586903 CET8049732158.101.44.242192.168.2.4
                                                                                                        Jan 7, 2025 05:02:56.113651037 CET4973280192.168.2.4158.101.44.242
                                                                                                        Jan 7, 2025 05:02:56.113825083 CET4973280192.168.2.4158.101.44.242
                                                                                                        Jan 7, 2025 05:02:56.118597984 CET8049732158.101.44.242192.168.2.4
                                                                                                        Jan 7, 2025 05:02:56.976543903 CET8049732158.101.44.242192.168.2.4
                                                                                                        Jan 7, 2025 05:02:57.022808075 CET4973280192.168.2.4158.101.44.242
                                                                                                        Jan 7, 2025 05:02:57.026058912 CET4973280192.168.2.4158.101.44.242
                                                                                                        Jan 7, 2025 05:02:57.030867100 CET8049732158.101.44.242192.168.2.4
                                                                                                        Jan 7, 2025 05:02:57.203186989 CET8049732158.101.44.242192.168.2.4
                                                                                                        Jan 7, 2025 05:02:57.223973036 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 7, 2025 05:02:57.224040031 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 7, 2025 05:02:57.224155903 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 7, 2025 05:02:57.252118111 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 7, 2025 05:02:57.252130985 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 7, 2025 05:02:57.257162094 CET4973280192.168.2.4158.101.44.242
                                                                                                        Jan 7, 2025 05:02:57.733393908 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 7, 2025 05:02:57.733506918 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 7, 2025 05:02:57.738861084 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 7, 2025 05:02:57.738871098 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 7, 2025 05:02:57.739156008 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 7, 2025 05:02:57.788419962 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 7, 2025 05:02:57.795588970 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 7, 2025 05:02:57.843329906 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 7, 2025 05:02:57.911475897 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 7, 2025 05:02:57.911546946 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 7, 2025 05:02:57.911673069 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 7, 2025 05:02:57.920454025 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 7, 2025 05:04:02.203289032 CET8049732158.101.44.242192.168.2.4
                                                                                                        Jan 7, 2025 05:04:02.203392982 CET4973280192.168.2.4158.101.44.242
                                                                                                        Jan 7, 2025 05:04:37.210942984 CET4973280192.168.2.4158.101.44.242
                                                                                                        Jan 7, 2025 05:04:37.215740919 CET8049732158.101.44.242192.168.2.4
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Jan 7, 2025 05:02:56.093465090 CET6243453192.168.2.41.1.1.1
                                                                                                        Jan 7, 2025 05:02:56.100646973 CET53624341.1.1.1192.168.2.4
                                                                                                        Jan 7, 2025 05:02:57.213774920 CET6316853192.168.2.41.1.1.1
                                                                                                        Jan 7, 2025 05:02:57.221148014 CET53631681.1.1.1192.168.2.4
                                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                        Jan 7, 2025 05:02:56.093465090 CET192.168.2.41.1.1.10x5841Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                        Jan 7, 2025 05:02:57.213774920 CET192.168.2.41.1.1.10xe403Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                        Jan 7, 2025 05:02:56.100646973 CET1.1.1.1192.168.2.40x5841No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                        Jan 7, 2025 05:02:56.100646973 CET1.1.1.1192.168.2.40x5841No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                        Jan 7, 2025 05:02:56.100646973 CET1.1.1.1192.168.2.40x5841No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                        Jan 7, 2025 05:02:56.100646973 CET1.1.1.1192.168.2.40x5841No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                        Jan 7, 2025 05:02:56.100646973 CET1.1.1.1192.168.2.40x5841No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                        Jan 7, 2025 05:02:56.100646973 CET1.1.1.1192.168.2.40x5841No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                        Jan 7, 2025 05:02:57.221148014 CET1.1.1.1192.168.2.40xe403No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                                        Jan 7, 2025 05:02:57.221148014 CET1.1.1.1192.168.2.40xe403No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                                        • reallyfreegeoip.org
                                                                                                        • checkip.dyndns.org
                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        0192.168.2.449732158.101.44.242807524C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Jan 7, 2025 05:02:56.113825083 CET151OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Connection: Keep-Alive
                                                                                                        Jan 7, 2025 05:02:56.976543903 CET321INHTTP/1.1 200 OK
                                                                                                        Date: Tue, 07 Jan 2025 04:02:56 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        X-Request-ID: d67769a081fd0e3ec128a14c2a725517
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                        Jan 7, 2025 05:02:57.026058912 CET127OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Jan 7, 2025 05:02:57.203186989 CET321INHTTP/1.1 200 OK
                                                                                                        Date: Tue, 07 Jan 2025 04:02:57 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        X-Request-ID: cd642ce4580c20c9334097654624a8fe
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        0192.168.2.449733188.114.97.34437524C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-07 04:02:57 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                        Host: reallyfreegeoip.org
                                                                                                        Connection: Keep-Alive
                                                                                                        2025-01-07 04:02:57 UTC857INHTTP/1.1 200 OK
                                                                                                        Date: Tue, 07 Jan 2025 04:02:57 GMT
                                                                                                        Content-Type: text/xml
                                                                                                        Content-Length: 362
                                                                                                        Connection: close
                                                                                                        Age: 1537366
                                                                                                        Cache-Control: max-age=31536000
                                                                                                        cf-cache-status: HIT
                                                                                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FaG9zVARSKPVQFwLV%2FpB6WLGcUqmKqzvVX6DvFGL8oDtSmjL8PmlTU6xB%2BupqR61FYPDB6G5COfbplY89%2FJ%2B2ga1yKgGlbsenM9V05bmHeJEVVXlHlaoygtcWPvmS4SlUhVGv4hL"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8fe10e278e7019cf-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2047&min_rtt=2047&rtt_var=768&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1426477&cwnd=252&unsent_bytes=0&cid=b87dc415f3c417ea&ts=188&x=0"
                                                                                                        2025-01-07 04:02:57 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                        Click to jump to process

                                                                                                        Click to jump to process

                                                                                                        Click to dive into process behavior distribution

                                                                                                        Click to jump to process

                                                                                                        Target ID:0
                                                                                                        Start time:23:02:54
                                                                                                        Start date:06/01/2025
                                                                                                        Path:C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe"
                                                                                                        Imagebase:0x470000
                                                                                                        File size:222'720 bytes
                                                                                                        MD5 hash:4947F452082BD2777D7DC32CF51035E5
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1660771776.00000000038E9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                        Reputation:low
                                                                                                        Has exited:true

                                                                                                        Target ID:2
                                                                                                        Start time:23:02:55
                                                                                                        Start date:06/01/2025
                                                                                                        Path:C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Users\user\Desktop\FORTUNE RICH_PARTICULARS.pdf.scr.exe"
                                                                                                        Imagebase:0x110000
                                                                                                        File size:222'720 bytes
                                                                                                        MD5 hash:4947F452082BD2777D7DC32CF51035E5
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2900884309.0000000000512000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2901912977.0000000002604000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        Reputation:low
                                                                                                        Has exited:false

                                                                                                        Reset < >

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:10.4%
                                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                                          Signature Coverage:2.5%
                                                                                                          Total number of Nodes:119
                                                                                                          Total number of Limit Nodes:13
                                                                                                          execution_graph 17507 bed788 DuplicateHandle 17508 bed81e 17507->17508 17509 be4668 17510 be467a 17509->17510 17511 be4686 17510->17511 17515 be4778 17510->17515 17520 be3e1c 17511->17520 17513 be46a5 17516 be479d 17515->17516 17524 be4888 17516->17524 17528 be4878 17516->17528 17521 be3e27 17520->17521 17536 be5cec 17521->17536 17523 be72f8 17523->17513 17526 be48af 17524->17526 17525 be498c 17525->17525 17526->17525 17532 be449c 17526->17532 17530 be48af 17528->17530 17529 be498c 17529->17529 17530->17529 17531 be449c CreateActCtxA 17530->17531 17531->17529 17533 be5918 CreateActCtxA 17532->17533 17535 be59db 17533->17535 17537 be5cf7 17536->17537 17540 be5d0c 17537->17540 17539 be739d 17539->17523 17541 be5d17 17540->17541 17544 be5d3c 17541->17544 17543 be747a 17543->17539 17545 be5d47 17544->17545 17548 be5d6c 17545->17548 17547 be756d 17547->17543 17550 be5d77 17548->17550 17549 be8b09 17549->17547 17550->17549 17552 bece60 17550->17552 17553 bece91 17552->17553 17554 beceb5 17553->17554 17558 bed428 17553->17558 17562 bed530 17553->17562 17573 bed418 17553->17573 17554->17549 17559 bed435 17558->17559 17560 bed46f 17559->17560 17577 bed230 17559->17577 17560->17554 17563 bed53a GetCurrentProcess 17562->17563 17567 bed487 17562->17567 17565 bed5d8 GetCurrentThread 17563->17565 17566 bed5d1 17563->17566 17568 bed60e 17565->17568 17569 bed615 GetCurrentProcess 17565->17569 17566->17565 17567->17554 17568->17569 17572 bed64b 17569->17572 17570 bed673 GetCurrentThreadId 17571 bed6a4 17570->17571 17571->17554 17572->17570 17574 bed435 17573->17574 17575 bed46f 17574->17575 17576 bed230 6 API calls 17574->17576 17575->17554 17576->17575 17578 bed23b 17577->17578 17580 bedd80 17578->17580 17581 bed35c 17578->17581 17580->17580 17582 bed367 17581->17582 17583 be5d6c 6 API calls 17582->17583 17584 beddef 17583->17584 17585 beddfe 17584->17585 17588 bee266 17584->17588 17592 bee270 17584->17592 17585->17580 17589 bee29e 17588->17589 17590 bee36a KiUserCallbackDispatcher 17589->17590 17591 bee36f 17589->17591 17590->17591 17593 bee29e 17592->17593 17594 bee36a KiUserCallbackDispatcher 17593->17594 17595 bee36f 17593->17595 17594->17595 17596 73c1787 17598 73c178a 17596->17598 17597 73c17d2 17598->17597 17601 73c1fc0 17598->17601 17607 73c1fb0 17598->17607 17602 73c1fdf 17601->17602 17613 73c20a2 17602->17613 17603 73c2013 17617 73c11d0 17603->17617 17605 73c2022 17605->17597 17608 73c1fdf 17607->17608 17612 73c20a2 GetCurrentThreadId 17608->17612 17609 73c2013 17610 73c11d0 GetCurrentThreadId 17609->17610 17611 73c2022 17610->17611 17611->17597 17612->17609 17614 73c20ff GetCurrentThreadId 17613->17614 17616 73c2145 17614->17616 17616->17603 17618 73c11db 17617->17618 17619 73c24cc GetCurrentThreadId 17618->17619 17620 73c24f7 17618->17620 17619->17620 17620->17605 17621 73c21a0 17622 73c21ee EnumThreadWindows 17621->17622 17623 73c21e4 17621->17623 17624 73c2220 17622->17624 17623->17622 17625 73c0d80 17626 73c1088 17625->17626 17627 73c0da8 17625->17627 17628 73c0db1 17627->17628 17632 73c10b0 17627->17632 17637 73c10a0 17627->17637 17629 73c0dd4 17629->17629 17633 73c10bb 17632->17633 17634 73c10cb 17633->17634 17642 73c1508 OleInitialize 17633->17642 17644 73c1307 17633->17644 17634->17629 17638 73c10bb 17637->17638 17639 73c10cb 17638->17639 17640 73c1508 OleInitialize 17638->17640 17641 73c1307 OleInitialize 17638->17641 17639->17629 17640->17639 17641->17639 17643 73c156c 17642->17643 17643->17634 17645 73c130b 17644->17645 17646 73c1376 OleInitialize 17644->17646 17645->17646 17647 73c156c 17646->17647 17647->17634 17499 beb1b0 17502 beb298 17499->17502 17500 beb1bf 17503 beb2dc 17502->17503 17504 beb2b9 17502->17504 17503->17500 17504->17503 17505 beb4e0 GetModuleHandleW 17504->17505 17506 beb50d 17505->17506 17506->17500
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1662044632.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_73c0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: eb13176c9952936a652acb36c5d8c97f1024503f864e879e622da20b5169d1ea
                                                                                                          • Instruction ID: c50d1b56a186379f0106fe432f7b8f28c915cb273c75ea8fc3d2b6b8d3a1b948
                                                                                                          • Opcode Fuzzy Hash: eb13176c9952936a652acb36c5d8c97f1024503f864e879e622da20b5169d1ea
                                                                                                          • Instruction Fuzzy Hash: 9AE14AF0A0020A8FEB14DFA5C945BADBBF1BF49314F15C558E409AB266DB70ED45EB80

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 294 bed530-bed538 295 bed53a-bed5cf GetCurrentProcess 294->295 296 bed4f7-bed4fa 294->296 309 bed5d8-bed60c GetCurrentThread 295->309 310 bed5d1-bed5d7 295->310 297 bed4fc-bed52f 296->297 298 bed487-bed4a8 296->298 302 bed4bf-bed4c0 298->302 303 bed4aa-bed4b8 call bed240 298->303 315 bed4bd 303->315 313 bed60e-bed614 309->313 314 bed615-bed649 GetCurrentProcess 309->314 310->309 313->314 317 bed64b-bed651 314->317 318 bed652-bed66d call bed710 314->318 315->302 317->318 321 bed673-bed6a2 GetCurrentThreadId 318->321 322 bed6ab-bed70d 321->322 323 bed6a4-bed6aa 321->323 323->322
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 00BED5BE
                                                                                                          • GetCurrentThread.KERNEL32 ref: 00BED5FB
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 00BED638
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 00BED691
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659859348.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_be0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Current$ProcessThread
                                                                                                          • String ID: 4'qq
                                                                                                          • API String ID: 2063062207-1915349394
                                                                                                          • Opcode ID: e4b28296dc22adcb97b1e48f93da4166d6a28e77cb5c77d458feb51680093d2f
                                                                                                          • Instruction ID: 41fa5021565f0cbd277d635c69dd68d1bc149911ade22a9b3e9db674ada40163
                                                                                                          • Opcode Fuzzy Hash: e4b28296dc22adcb97b1e48f93da4166d6a28e77cb5c77d458feb51680093d2f
                                                                                                          • Instruction Fuzzy Hash: F9618DB19003498FDB14DFAAD548BDEBBF1EF88304F208499E409AB3A0D7755944CB61

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 330 bed540-bed5cf GetCurrentProcess 334 bed5d8-bed60c GetCurrentThread 330->334 335 bed5d1-bed5d7 330->335 336 bed60e-bed614 334->336 337 bed615-bed649 GetCurrentProcess 334->337 335->334 336->337 339 bed64b-bed651 337->339 340 bed652-bed66d call bed710 337->340 339->340 343 bed673-bed6a2 GetCurrentThreadId 340->343 344 bed6ab-bed70d 343->344 345 bed6a4-bed6aa 343->345 345->344
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 00BED5BE
                                                                                                          • GetCurrentThread.KERNEL32 ref: 00BED5FB
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 00BED638
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 00BED691
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659859348.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_be0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Current$ProcessThread
                                                                                                          • String ID:
                                                                                                          • API String ID: 2063062207-0
                                                                                                          • Opcode ID: b098fcdc0720efc839147c344ac4a268a1b26a6b5d7f0ba97c54a9d5c79b54c8
                                                                                                          • Instruction ID: 2a9831bf92fb6f0f4c39b319dcc0fbc97b19d1a09dc7678535704e9533d73109
                                                                                                          • Opcode Fuzzy Hash: b098fcdc0720efc839147c344ac4a268a1b26a6b5d7f0ba97c54a9d5c79b54c8
                                                                                                          • Instruction Fuzzy Hash: 025146B09003498FDB58DFAAD548B9EBBF1EF88314F20C459E409A73A0DB759984CF65

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 417 73c1307-73c1309 418 73c130b 417->418 419 73c1376-73c156a OleInitialize 417->419 418->419 420 73c156c-73c1572 419->420 421 73c1573-73c1590 419->421 420->421
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1662044632.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_73c0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 222c3dc8c4feac9c494a649f35df5c08cf777d1c571c63204daad31609c078b7
                                                                                                          • Instruction ID: 7fde97773835d25d6152e68fc913bc3eb9d73b4374c2ef7630a9db0c77d6c8b7
                                                                                                          • Opcode Fuzzy Hash: 222c3dc8c4feac9c494a649f35df5c08cf777d1c571c63204daad31609c078b7
                                                                                                          • Instruction Fuzzy Hash: 741173F5C003888FDB10DFADC444ADEBFF0AB48324F20855AD119A7202C375A944CFA1

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 424 beb298-beb2b7 425 beb2b9-beb2c6 call beaf38 424->425 426 beb2e3-beb2e7 424->426 432 beb2dc 425->432 433 beb2c8 425->433 428 beb2fb-beb33c 426->428 429 beb2e9-beb2f3 426->429 435 beb33e-beb346 428->435 436 beb349-beb357 428->436 429->428 432->426 479 beb2ce call beb532 433->479 480 beb2ce call beb540 433->480 435->436 437 beb37b-beb37d 436->437 438 beb359-beb35e 436->438 443 beb380-beb387 437->443 440 beb369 438->440 441 beb360-beb367 call beaf44 438->441 439 beb2d4-beb2d6 439->432 442 beb418-beb4d8 439->442 445 beb36b-beb379 440->445 441->445 474 beb4da-beb4dd 442->474 475 beb4e0-beb50b GetModuleHandleW 442->475 446 beb389-beb391 443->446 447 beb394-beb39b 443->447 445->443 446->447 448 beb39d-beb3a5 447->448 449 beb3a8-beb3b1 call beaf54 447->449 448->449 455 beb3be-beb3c3 449->455 456 beb3b3-beb3bb 449->456 457 beb3c5-beb3cc 455->457 458 beb3e1-beb3ee 455->458 456->455 457->458 460 beb3ce-beb3de call beaf64 call beaf74 457->460 465 beb3f0-beb40e 458->465 466 beb411-beb417 458->466 460->458 465->466 474->475 476 beb50d-beb513 475->476 477 beb514-beb528 475->477 476->477 479->439 480->439
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00BEB4FE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659859348.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_be0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleModule
                                                                                                          • String ID:
                                                                                                          • API String ID: 4139908857-0
                                                                                                          • Opcode ID: 9847d917b1fdc3d46e37560acd202bc15c4ac232a981c7f72eef86c0c8eda427
                                                                                                          • Instruction ID: bb95d4cc5e427dbbb280573b52af4e84902872b11c902c45c3a1d5a68045df45
                                                                                                          • Opcode Fuzzy Hash: 9847d917b1fdc3d46e37560acd202bc15c4ac232a981c7f72eef86c0c8eda427
                                                                                                          • Instruction Fuzzy Hash: E08123B0A00B858FDB24DF2AD451B5BBBF1FF88300F1089A9D08AD7A50D775E945CB91

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 481 be590c-be5914 482 be591c-be59d9 CreateActCtxA 481->482 484 be59db-be59e1 482->484 485 be59e2-be5a3c 482->485 484->485 492 be5a3e-be5a41 485->492 493 be5a4b-be5a4f 485->493 492->493 494 be5a60 493->494 495 be5a51-be5a5d 493->495 497 be5a61 494->497 495->494 497->497
                                                                                                          APIs
                                                                                                          • CreateActCtxA.KERNEL32(?), ref: 00BE59C9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659859348.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_be0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Create
                                                                                                          • String ID:
                                                                                                          • API String ID: 2289755597-0
                                                                                                          • Opcode ID: 703b3556ca634dd98a4bda7b43afa137cf80bd442bbd6780af3f3a8270bac0c1
                                                                                                          • Instruction ID: 67498dc4edc3e74ea916319706cb2e749d5a813b2bc1c947ee69fca2a991c4bd
                                                                                                          • Opcode Fuzzy Hash: 703b3556ca634dd98a4bda7b43afa137cf80bd442bbd6780af3f3a8270bac0c1
                                                                                                          • Instruction Fuzzy Hash: 7F41C1B1C00759CADB24DFAAC8846DEBBF1BF48314F2081AAD419AB251DB756946CF50

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 498 be449c-be59d9 CreateActCtxA 501 be59db-be59e1 498->501 502 be59e2-be5a3c 498->502 501->502 509 be5a3e-be5a41 502->509 510 be5a4b-be5a4f 502->510 509->510 511 be5a60 510->511 512 be5a51-be5a5d 510->512 514 be5a61 511->514 512->511 514->514
                                                                                                          APIs
                                                                                                          • CreateActCtxA.KERNEL32(?), ref: 00BE59C9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659859348.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_be0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Create
                                                                                                          • String ID:
                                                                                                          • API String ID: 2289755597-0
                                                                                                          • Opcode ID: 8f7d108412ed35919f930ce97895fcbf21a90f29de95e19dd4f921d63d8c0bb8
                                                                                                          • Instruction ID: e8e9e2e19d86dbb20fbfb12458eb8add90bf6c958506d8f0f5ff5384ad8a18a6
                                                                                                          • Opcode Fuzzy Hash: 8f7d108412ed35919f930ce97895fcbf21a90f29de95e19dd4f921d63d8c0bb8
                                                                                                          • Instruction Fuzzy Hash: 4F41CFB0C0075DCADB24DFAAC884A9EBBF5FF48304F2081AAD509AB251DB756945CF90

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 515 73c20a2-73c2143 GetCurrentThreadId 519 73c214c-73c217b call 73c1224 515->519 520 73c2145-73c214b 515->520 524 73c2180-73c218d 519->524 520->519
                                                                                                          APIs
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 073C2132
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1662044632.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_73c0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CurrentThread
                                                                                                          • String ID:
                                                                                                          • API String ID: 2882836952-0
                                                                                                          • Opcode ID: c0583bf2c944cb95c3cf867baf3d33e4c532ea9cd9308d27bf4b6d779dca89fe
                                                                                                          • Instruction ID: 23c50833e4aff6b9d8d4545958070e98728398639e681b9d4af86fc40484a32a
                                                                                                          • Opcode Fuzzy Hash: c0583bf2c944cb95c3cf867baf3d33e4c532ea9cd9308d27bf4b6d779dca89fe
                                                                                                          • Instruction Fuzzy Hash: 643123B590039A8FDB01DF99C884A9EFFF0FF49314F14869AD419AB212C375A944CFA1

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 525 bed780-bed786 526 bed788-bed81c DuplicateHandle 525->526 527 bed81e-bed824 526->527 528 bed825-bed842 526->528 527->528
                                                                                                          APIs
                                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00BED80F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659859348.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_be0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DuplicateHandle
                                                                                                          • String ID:
                                                                                                          • API String ID: 3793708945-0
                                                                                                          • Opcode ID: 6c584abb0bacbc74839f2ba3c9a92f929e4d4a96a83a50143cda3116d2aebbb5
                                                                                                          • Instruction ID: 1d9a76341dd12e955418088d7b73ad4b2d3a9f116de1da53aa3fea89bf139b5d
                                                                                                          • Opcode Fuzzy Hash: 6c584abb0bacbc74839f2ba3c9a92f929e4d4a96a83a50143cda3116d2aebbb5
                                                                                                          • Instruction Fuzzy Hash: D921E3B5900348AFDB10CFAAD984ADEBBF4FB48320F14845AE918A7350D374A954DFA1

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 531 bed788-bed81c DuplicateHandle 532 bed81e-bed824 531->532 533 bed825-bed842 531->533 532->533
                                                                                                          APIs
                                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00BED80F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659859348.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_be0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DuplicateHandle
                                                                                                          • String ID:
                                                                                                          • API String ID: 3793708945-0
                                                                                                          • Opcode ID: 378269e90d607c40031661dd67616ab3c5f0eaa6e3f499af9af21074fb883621
                                                                                                          • Instruction ID: 389a49b56ded03c2d7fbbd371ff54e74d9d0cf08f173320e47b54bde18cd4fc5
                                                                                                          • Opcode Fuzzy Hash: 378269e90d607c40031661dd67616ab3c5f0eaa6e3f499af9af21074fb883621
                                                                                                          • Instruction Fuzzy Hash: 6A21E2B59002489FDB10CFAAD984ADEBFF8FB48320F14845AE918A3350D374A944CFA0

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 536 73c2198-73c21e2 537 73c21ee-73c221e EnumThreadWindows 536->537 538 73c21e4-73c21ec 536->538 539 73c2227-73c2254 537->539 540 73c2220-73c2226 537->540 538->537 540->539
                                                                                                          APIs
                                                                                                          • EnumThreadWindows.USER32(?,00000000,?), ref: 073C2211
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1662044632.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_73c0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnumThreadWindows
                                                                                                          • String ID:
                                                                                                          • API String ID: 2941952884-0
                                                                                                          • Opcode ID: 0d7eea8d47a6bc03b839fcab1b24a8b362892a05c65f664fb9bf5255a3d6fea4
                                                                                                          • Instruction ID: 7070847c4eee4f9a515bff41a45b768b8803eb7d7b7318ed773a1f415aacb6f1
                                                                                                          • Opcode Fuzzy Hash: 0d7eea8d47a6bc03b839fcab1b24a8b362892a05c65f664fb9bf5255a3d6fea4
                                                                                                          • Instruction Fuzzy Hash: 2321F5B19002598FDB14CFAAC844BEEFBF5FB88320F14842AD459A7250C774A944CFA0
                                                                                                          APIs
                                                                                                          • EnumThreadWindows.USER32(?,00000000,?), ref: 073C2211
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1662044632.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_73c0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnumThreadWindows
                                                                                                          • String ID:
                                                                                                          • API String ID: 2941952884-0
                                                                                                          • Opcode ID: 3be7185c1f9af3a1fc96bde26f2eef5d197afa106bd80712333ef11625cd4857
                                                                                                          • Instruction ID: 0a91c6f0ff9026d965eba2b961570e4efafc191fb493150de45c3473b7c3d89b
                                                                                                          • Opcode Fuzzy Hash: 3be7185c1f9af3a1fc96bde26f2eef5d197afa106bd80712333ef11625cd4857
                                                                                                          • Instruction Fuzzy Hash: 652136B1D0025A8FDB14CF9AC844BEEFBF5FB88320F14842AD458A3250D778A944CFA0
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00BEB4FE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659859348.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_be0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleModule
                                                                                                          • String ID:
                                                                                                          • API String ID: 4139908857-0
                                                                                                          • Opcode ID: 34e120ea57e22fa932203b691648efe2175749f987e5330056042cc1e0577909
                                                                                                          • Instruction ID: f3f9b14caa4178bd0c989c5c44668c4bf7f87237a479dbfee464e00baaea339b
                                                                                                          • Opcode Fuzzy Hash: 34e120ea57e22fa932203b691648efe2175749f987e5330056042cc1e0577909
                                                                                                          • Instruction Fuzzy Hash: 6B110FB6C003898FCB10CF9AC444A9EFBF4EB88324F10845AD429A7210C375A645CFA1
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1662044632.00000000073C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073C0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_73c0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Initialize
                                                                                                          • String ID:
                                                                                                          • API String ID: 2538663250-0
                                                                                                          • Opcode ID: b9410d8011a4fb28b7b5c3024b03a324829cf5dc7b5310155872bd0cf1ce9efc
                                                                                                          • Instruction ID: a794e484c5c8152d5b0bcd773e567a1290d3f5e9f54bbc1b7a9b325fefa21675
                                                                                                          • Opcode Fuzzy Hash: b9410d8011a4fb28b7b5c3024b03a324829cf5dc7b5310155872bd0cf1ce9efc
                                                                                                          • Instruction Fuzzy Hash: 6F1112B58003488FDB10DF9AD449B8EBFF4EB48320F20845AD519A7201C375A944CFA5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659697821.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_a7d000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 977d3b2332fd48c234b4fe3fedaa8d371103cdc7d4cb69a4c98b61ce29d340a0
                                                                                                          • Instruction ID: 06c4f3ae9fdf8861608b6a251b2131f9665d0c67676503de1fda16e2afd092e6
                                                                                                          • Opcode Fuzzy Hash: 977d3b2332fd48c234b4fe3fedaa8d371103cdc7d4cb69a4c98b61ce29d340a0
                                                                                                          • Instruction Fuzzy Hash: 7121E0B6614240DFCB05DF14D984B26BF76FF98324F24C569E90E0A256C336D816DAA1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659773197.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b9d000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 02b262261a1e968ae9fdbf9f3ace24d9df7cea3134d6319f82cbcf38af83d9cf
                                                                                                          • Instruction ID: 282ed0fc93484b7eab831a46b14e865217913424f3a50341501bd5208949e859
                                                                                                          • Opcode Fuzzy Hash: 02b262261a1e968ae9fdbf9f3ace24d9df7cea3134d6319f82cbcf38af83d9cf
                                                                                                          • Instruction Fuzzy Hash: 7E21D075604200DFDF14DF24D9D4B26BBA5FB94314F24CABDD80A4B296C33AD807CA61
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659773197.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_b9d000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 41565fd8a8cf097ea4ddb61e576981b80d17462f74e80d3c2cdfb059d631e87c
                                                                                                          • Instruction ID: 837eb53d30ff6358b28a51b7ec7b652cc70cfd7f8f082ca9ac4c6d124ce5402c
                                                                                                          • Opcode Fuzzy Hash: 41565fd8a8cf097ea4ddb61e576981b80d17462f74e80d3c2cdfb059d631e87c
                                                                                                          • Instruction Fuzzy Hash: C42184755093808FDB16CF24D5A4715BFB1EB45314F28C5EAD8498B697C33A980ACB62
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659697821.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_a7d000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                                                          • Instruction ID: 889659fe924ad9215cea55fbd705e37a96942b04aca5ae03a7282835797c0687
                                                                                                          • Opcode Fuzzy Hash: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                                                          • Instruction Fuzzy Hash: 3011AF76504280CFCB06CF14D9C4B16BF72FB94324F24C5A9D80D0B656C336D85ACBA1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1659859348.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_be0000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 96856898dc609c9676e2e56bf99c207d2086a7a3cfef542f13e2ae6f5839e588
                                                                                                          • Instruction ID: d77365f81b09bfdce31d1ea50cc0f145907d5ba08af59da9cafca1793012dcf1
                                                                                                          • Opcode Fuzzy Hash: 96856898dc609c9676e2e56bf99c207d2086a7a3cfef542f13e2ae6f5839e588
                                                                                                          • Instruction Fuzzy Hash: DFA15B36A002568FCF05DFB6C8845AEB7F2FF84300B1545BAE815AB266DB71ED55CB80

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:14.1%
                                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                                          Signature Coverage:0%
                                                                                                          Total number of Nodes:34
                                                                                                          Total number of Limit Nodes:3
                                                                                                          execution_graph 12337 a946d8 12338 a946e4 12337->12338 12341 a97d10 12338->12341 12342 a97d2c 12341->12342 12346 a97f48 12342->12346 12353 a97f37 12342->12353 12343 a94713 12347 a97f6a 12346->12347 12348 a98036 12347->12348 12360 a9f50c 12347->12360 12366 a9f128 12347->12366 12372 a9ef08 12347->12372 12376 a9eef9 12347->12376 12348->12343 12354 a97f48 12353->12354 12355 a98036 12354->12355 12356 a9eef9 2 API calls 12354->12356 12357 a9ef08 LdrInitializeThunk 12354->12357 12358 a9f128 2 API calls 12354->12358 12359 a9f50c 2 API calls 12354->12359 12355->12343 12356->12355 12357->12355 12358->12355 12359->12355 12361 a9f3c3 12360->12361 12363 a9f504 LdrInitializeThunk 12361->12363 12365 a9ef08 LdrInitializeThunk 12361->12365 12364 a9f661 12363->12364 12364->12348 12365->12361 12371 a9f159 12366->12371 12367 a9f2b9 12367->12348 12368 a9f504 LdrInitializeThunk 12368->12367 12370 a9ef08 LdrInitializeThunk 12370->12371 12371->12367 12371->12368 12371->12370 12373 a9ef1f 12372->12373 12374 a9ef1a 12372->12374 12373->12374 12375 a9f649 LdrInitializeThunk 12373->12375 12374->12348 12375->12374 12377 a9ef1a 12376->12377 12381 a9ef1f 12376->12381 12377->12348 12378 a9f504 LdrInitializeThunk 12378->12377 12380 a9ef08 LdrInitializeThunk 12380->12381 12381->12377 12381->12378 12381->12380

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 982 a9f128-a9f157 983 a9f159 982->983 984 a9f15e-a9f1f4 call a98e48 982->984 983->984 987 a9f293-a9f299 984->987 988 a9f1f9-a9f20c 987->988 989 a9f29f-a9f2b7 987->989 990 a9f20e 988->990 991 a9f213-a9f264 988->991 992 a9f2b9-a9f2c6 989->992 993 a9f2cb-a9f2de 989->993 990->991 1010 a9f277-a9f289 991->1010 1011 a9f266-a9f274 991->1011 994 a9f661-a9f75f 992->994 995 a9f2e0 993->995 996 a9f2e5-a9f301 993->996 1001 a9f761-a9f766 call a98e48 994->1001 1002 a9f767-a9f771 994->1002 995->996 998 a9f308-a9f32c 996->998 999 a9f303 996->999 1007 a9f32e 998->1007 1008 a9f333-a9f365 998->1008 999->998 1001->1002 1007->1008 1016 a9f36c-a9f3ae 1008->1016 1017 a9f367 1008->1017 1013 a9f28b 1010->1013 1014 a9f290 1010->1014 1011->989 1013->1014 1014->987 1019 a9f3b0 1016->1019 1020 a9f3b5-a9f3be 1016->1020 1017->1016 1019->1020 1021 a9f5e6-a9f5ec 1020->1021 1022 a9f3c3-a9f3e8 1021->1022 1023 a9f5f2-a9f605 1021->1023 1024 a9f3ea 1022->1024 1025 a9f3ef-a9f426 1022->1025 1026 a9f60c-a9f627 1023->1026 1027 a9f607 1023->1027 1024->1025 1035 a9f428 1025->1035 1036 a9f42d-a9f45f 1025->1036 1028 a9f629 1026->1028 1029 a9f62e-a9f642 1026->1029 1027->1026 1028->1029 1032 a9f649-a9f65f LdrInitializeThunk 1029->1032 1033 a9f644 1029->1033 1032->994 1033->1032 1035->1036 1038 a9f461-a9f486 1036->1038 1039 a9f4c3-a9f4d6 1036->1039 1040 a9f488 1038->1040 1041 a9f48d-a9f4bb 1038->1041 1042 a9f4d8 1039->1042 1043 a9f4dd-a9f502 1039->1043 1040->1041 1041->1039 1042->1043 1046 a9f511-a9f549 1043->1046 1047 a9f504-a9f505 1043->1047 1048 a9f54b 1046->1048 1049 a9f550-a9f5b1 call a9ef08 1046->1049 1047->1023 1048->1049 1055 a9f5b8-a9f5dc 1049->1055 1056 a9f5b3 1049->1056 1059 a9f5de 1055->1059 1060 a9f5e3 1055->1060 1056->1055 1059->1060 1060->1021
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2901632173.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_a90000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: dd19089091be076f36f0467a0d91512aa1ec6aa0990835f3fb831a56fdd9b830
                                                                                                          • Instruction ID: ee4e65b127c5bf079948e5d2302c3a53c34fd8ad6b37d291125da6c640770a8b
                                                                                                          • Opcode Fuzzy Hash: dd19089091be076f36f0467a0d91512aa1ec6aa0990835f3fb831a56fdd9b830
                                                                                                          • Instruction Fuzzy Hash: EAF1E274E01218CFDB14DFA9C984B9DBBF2BF88304F1481A9E808AB355DB75A985CF50

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1315 a97f48-a97f68 1316 a97f6a 1315->1316 1317 a97f6f-a98000 1315->1317 1316->1317 1321 a98354-a98388 1317->1321 1322 a98006-a98016 1317->1322 1372 a98019 call a98508 1322->1372 1373 a98019 call a9884f 1322->1373 1326 a9801f-a9802e 1374 a98030 call a9eef9 1326->1374 1375 a98030 call a9ef08 1326->1375 1376 a98030 call a9f128 1326->1376 1377 a98030 call a9f50c 1326->1377 1327 a98036-a98052 1329 a98059-a98062 1327->1329 1330 a98054 1327->1330 1331 a98347-a9834d 1329->1331 1330->1329 1332 a98353 1331->1332 1333 a98067-a98073 1331->1333 1332->1321 1334 a9807b-a980e1 1333->1334 1338 a9819d-a981f8 1334->1338 1339 a980e7-a98155 call a974e0 1334->1339 1351 a981f9-a98249 1338->1351 1349 a98198-a9819b 1339->1349 1350 a98157-a98197 1339->1350 1349->1351 1350->1349 1356 a9824f-a98331 1351->1356 1357 a98332-a9833d 1351->1357 1356->1357 1358 a9833f 1357->1358 1359 a98344 1357->1359 1358->1359 1359->1331 1372->1326 1373->1326 1374->1327 1375->1327 1376->1327 1377->1327
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2901632173.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_a90000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 2f4c44d7d8da600b62975855efa60ab7c407a93d8fd2116b355f21976354879a
                                                                                                          • Instruction ID: f8db32cffcf6385b2738012f0ff2e11fb95d15bef3c8f836bca9738872364f32
                                                                                                          • Opcode Fuzzy Hash: 2f4c44d7d8da600b62975855efa60ab7c407a93d8fd2116b355f21976354879a
                                                                                                          • Instruction Fuzzy Hash: 40C1AF78E01218CFDB14DFA5D994B9DBBF2BB89301F2080A9D809AB355DB355E85CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2901632173.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_a90000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a4ecbcb34fbfc9514ebdbb3113770290fd9050d824d38215518e4d02b592b327
                                                                                                          • Instruction ID: 777084932f1b6c6ec6340e04e4ecd362406cdab286c96cb644de7c187e9cc8ed
                                                                                                          • Opcode Fuzzy Hash: a4ecbcb34fbfc9514ebdbb3113770290fd9050d824d38215518e4d02b592b327
                                                                                                          • Instruction Fuzzy Hash: 23A10474E00208CFDB14DFA9C998B9DBBF1FF89304F208269E409AB291DB759985CF54
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2901632173.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_a90000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 82e65ac9636e099b1a6649b6fd16b246c2b48e89b50dc9b660b1f20499fa96db
                                                                                                          • Instruction ID: 38b634dfe57fcfd5d4b9e4eca14c43cf7e194594908681cb3841588d2c59e1da
                                                                                                          • Opcode Fuzzy Hash: 82e65ac9636e099b1a6649b6fd16b246c2b48e89b50dc9b660b1f20499fa96db
                                                                                                          • Instruction Fuzzy Hash: BC91F574E00218CFDB14DFA8C598BACBBF1FF89310F209259E409AB291DB799985CF55

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1061 a9f50c 1062 a9f5cb-a9f5dc 1061->1062 1063 a9f5de 1062->1063 1064 a9f5e3-a9f5ec 1062->1064 1063->1064 1066 a9f3c3-a9f3e8 1064->1066 1067 a9f5f2-a9f605 1064->1067 1068 a9f3ea 1066->1068 1069 a9f3ef-a9f426 1066->1069 1070 a9f60c-a9f627 1067->1070 1071 a9f607 1067->1071 1068->1069 1080 a9f428 1069->1080 1081 a9f42d-a9f45f 1069->1081 1072 a9f629 1070->1072 1073 a9f62e-a9f642 1070->1073 1071->1070 1072->1073 1076 a9f649-a9f65f LdrInitializeThunk 1073->1076 1077 a9f644 1073->1077 1079 a9f661-a9f75f 1076->1079 1077->1076 1083 a9f761-a9f766 call a98e48 1079->1083 1084 a9f767-a9f771 1079->1084 1080->1081 1087 a9f461-a9f486 1081->1087 1088 a9f4c3-a9f4d6 1081->1088 1083->1084 1090 a9f488 1087->1090 1091 a9f48d-a9f4bb 1087->1091 1092 a9f4d8 1088->1092 1093 a9f4dd-a9f502 1088->1093 1090->1091 1091->1088 1092->1093 1096 a9f511-a9f549 1093->1096 1097 a9f504-a9f505 1093->1097 1098 a9f54b 1096->1098 1099 a9f550-a9f5b1 call a9ef08 1096->1099 1097->1067 1098->1099 1105 a9f5b8-a9f5ca 1099->1105 1106 a9f5b3 1099->1106 1105->1062 1106->1105
                                                                                                          APIs
                                                                                                          • LdrInitializeThunk.NTDLL(00000000), ref: 00A9F64E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2901632173.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_a90000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID:
                                                                                                          • API String ID: 2994545307-0
                                                                                                          • Opcode ID: 6341ec751f37a13ded8be6b1653949d2a7f09902641c0cbae21090eea2a07f45
                                                                                                          • Instruction ID: c0bc3dc0403e41423563dec22a2a9719989b7dc4d85e59e2d0070aad2af7be7a
                                                                                                          • Opcode Fuzzy Hash: 6341ec751f37a13ded8be6b1653949d2a7f09902641c0cbae21090eea2a07f45
                                                                                                          • Instruction Fuzzy Hash: 8D1126B4E012099FDF04DFA9D994AADBBF5FB88304F248565E904EB251DB31EC45CB60
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2901187015.000000000074D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0074D000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_74d000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 7e42db26d53fe8b934c7d3f7ec0df6db14ae9384624956bec7930d350b2104f7
                                                                                                          • Instruction ID: ca9bdf3cdade18c919c6d0c6933a66063448f55c7084b4990bc9acfc3736e23a
                                                                                                          • Opcode Fuzzy Hash: 7e42db26d53fe8b934c7d3f7ec0df6db14ae9384624956bec7930d350b2104f7
                                                                                                          • Instruction Fuzzy Hash: 0621F5B1604204DFCB25DF14D9C4B26BBA5FB94314F24C56DD98A4B2A2C33ADC47CA61
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2901187015.000000000074D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0074D000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_74d000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                                                                          • Instruction ID: 4edb68d2c680e48f6fe5b944a910ffd656860f82f953f9ee97e7a6050b59b012
                                                                                                          • Opcode Fuzzy Hash: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                                                                          • Instruction Fuzzy Hash: ED11D075504284CFCB21CF14D5C4B15FBB1FB84314F24C6AED8494B666C33AD84ACB61
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2901632173.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_a90000_FORTUNE RICH_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 36f1278b418626d07836176c753f85547289da4476fd85691011b388c8bda4ae
                                                                                                          • Instruction ID: 783fae3ba859233a9ee76794bf6781e0898d7a0bef1d10e99502d415338f2352
                                                                                                          • Opcode Fuzzy Hash: 36f1278b418626d07836176c753f85547289da4476fd85691011b388c8bda4ae
                                                                                                          • Instruction Fuzzy Hash: 7DD1D274E01218CFDB14DFA5C994B9DBBF2AF89300F2084A9D808AB365DB759D85DF50