Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FACTURAS PENDIENTES.exe

Overview

General Information

Sample name:FACTURAS PENDIENTES.exe
Analysis ID:1629266
MD5:ce21d13c05134c7f3eaf6adcca9de628
SHA1:11dba134b8dbf5f792ea618ee72601f9c50f91a9
SHA256:22cd6167198a1ec170b1be60d7524e36d454b1a7183acaa99cdf328629e52425
Tags:exeuser-TeamDreier
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • FACTURAS PENDIENTES.exe (PID: 6176 cmdline: "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe" MD5: CE21D13C05134C7F3EAF6ADCCA9DE628)
    • powershell.exe (PID: 7324 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • FACTURAS PENDIENTES.exe (PID: 7332 cmdline: "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe" MD5: CE21D13C05134C7F3EAF6ADCCA9DE628)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7811478868:AAFz8G54tjfmoXGXiHlkaDDwEoEtiu2Dae8/sendMessage?chat_id=5692813672", "Token": "7811478868:AAFz8G54tjfmoXGXiHlkaDDwEoEtiu2Dae8", "Chat_id": "5692813672", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x148e8:$a1: get_encryptedPassword
      • 0x14bd4:$a2: get_encryptedUsername
      • 0x146f4:$a3: get_timePasswordChanged
      • 0x147ef:$a4: get_passwordField
      • 0x148fe:$a5: set_encryptedPassword
      • 0x15f84:$a7: get_logins
      • 0x15ee7:$a10: KeyLoggerEventArgs
      • 0x15b52:$a11: KeyLoggerEventArgsEventHandler
      0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x198a8:$x1: $%SMTPDV$
      • 0x1828c:$x2: $#TheHashHere%&
      • 0x19850:$x3: %FTPDV$
      • 0x1822c:$x4: $%TelegramDv$
      • 0x15b52:$x5: KeyLoggerEventArgs
      • 0x15ee7:$x5: KeyLoggerEventArgs
      • 0x19874:$m2: Clipboard Logs ID
      • 0x19ab2:$m2: Screenshot Logs ID
      • 0x19bc2:$m2: keystroke Logs ID
      • 0x19e9c:$m3: SnakePW
      • 0x19a8a:$m4: \SnakeKeylogger\
      0000000B.00000002.3740949613.0000000002ECF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        Click to see the 14 entries
        SourceRuleDescriptionAuthorStrings
        11.2.FACTURAS PENDIENTES.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x12ce8:$a1: get_encryptedPassword
              • 0x12fd4:$a2: get_encryptedUsername
              • 0x12af4:$a3: get_timePasswordChanged
              • 0x12bef:$a4: get_passwordField
              • 0x12cfe:$a5: set_encryptedPassword
              • 0x14384:$a7: get_logins
              • 0x142e7:$a10: KeyLoggerEventArgs
              • 0x13f52:$a11: KeyLoggerEventArgsEventHandler
              11.2.FACTURAS PENDIENTES.exe.400000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                Click to see the 25 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe", ParentImage: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe, ParentProcessId: 6176, ParentProcessName: FACTURAS PENDIENTES.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe", ProcessId: 7324, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe", ParentImage: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe, ParentProcessId: 6176, ParentProcessName: FACTURAS PENDIENTES.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe", ProcessId: 7324, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe", ParentImage: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe, ParentProcessId: 6176, ParentProcessName: FACTURAS PENDIENTES.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe", ProcessId: 7324, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-04T15:35:47.019690+010028033053Unknown Traffic192.168.2.749706104.21.112.1443TCP
                2025-03-04T15:35:48.253284+010028033053Unknown Traffic192.168.2.749709104.21.112.1443TCP
                2025-03-04T15:35:51.248113+010028033053Unknown Traffic192.168.2.749733104.21.112.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-04T15:35:45.476717+010028032742Potentially Bad Traffic192.168.2.749702158.101.44.24280TCP
                2025-03-04T15:35:46.460942+010028032742Potentially Bad Traffic192.168.2.749702158.101.44.24280TCP
                2025-03-04T15:35:47.664077+010028032742Potentially Bad Traffic192.168.2.749708158.101.44.24280TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: FACTURAS PENDIENTES.exeAvira: detected
                Source: 00000004.00000002.1325393907.0000000003D09000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7811478868:AAFz8G54tjfmoXGXiHlkaDDwEoEtiu2Dae8/sendMessage?chat_id=5692813672", "Token": "7811478868:AAFz8G54tjfmoXGXiHlkaDDwEoEtiu2Dae8", "Chat_id": "5692813672", "Version": "5.1"}
                Source: FACTURAS PENDIENTES.exeVirustotal: Detection: 54%Perma Link
                Source: FACTURAS PENDIENTES.exeReversingLabs: Detection: 55%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpackString decryptor:
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpackString decryptor: 7811478868:AAFz8G54tjfmoXGXiHlkaDDwEoEtiu2Dae8
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpackString decryptor: 5692813672

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: FACTURAS PENDIENTES.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.7:49704 version: TLS 1.0
                Source: FACTURAS PENDIENTES.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: ZiDJYa.pdbSHA256 source: FACTURAS PENDIENTES.exe
                Source: Binary string: ZiDJYa.pdb source: FACTURAS PENDIENTES.exe
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 0121F1F6h11_2_0121F007
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 0121FB80h11_2_0121F007
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_0121E528
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_0121EB5B
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_0121ED3C
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06998945h11_2_06998608
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06996171h11_2_06995EC8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]11_2_069936CE
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 069958C1h11_2_06995618
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06996A21h11_2_06996778
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06990741h11_2_06990498
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06997751h11_2_069974A8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06998001h11_2_06997D58
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06990FF1h11_2_06990D48
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06995D19h11_2_06995A70
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]11_2_069933B8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]11_2_069933A8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06996E79h11_2_06996BD0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 069965C9h11_2_06996320
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06990B99h11_2_069908F0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 069972FAh11_2_06997050
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 069902E9h11_2_06990040
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06995441h11_2_06995198
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06998459h11_2_069981B0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4x nop then jmp 06997BA9h11_2_06997900
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
                Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
                Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49702 -> 158.101.44.242:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49708 -> 158.101.44.242:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49709 -> 104.21.112.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49706 -> 104.21.112.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49733 -> 104.21.112.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.7:49704 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E69000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E5B000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002DC8000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002EB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E69000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E5B000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E92000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E08000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002DC8000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002EB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: FACTURAS PENDIENTES.exe, 00000004.00000002.1325393907.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: FACTURAS PENDIENTES.exe, 0000000B.00000002.3745532285.0000000006500000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://microsoft.co
                Source: FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E69000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E5B000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002EB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: FACTURAS PENDIENTES.exe, 00000004.00000002.1320114536.0000000002D85000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E69000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E5B000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E08000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002DC8000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002EB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: FACTURAS PENDIENTES.exe, 00000004.00000002.1325393907.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002DC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002EB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E69000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E84000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E5B000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002E08000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002EB2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443

                System Summary

                barindex
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 11.2.FACTURAS PENDIENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 11.2.FACTURAS PENDIENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 11.2.FACTURAS PENDIENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 11.2.FACTURAS PENDIENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000004.00000002.1325393907.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000004.00000002.1325393907.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 6176, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 6176, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 7332, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 7332, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4_2_02ACDE844_2_02ACDE84
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4_2_05DCF2E54_2_05DCF2E5
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4_2_05DCC5D04_2_05DCC5D0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4_2_0715F4484_2_0715F448
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4_2_0719CDE84_2_0719CDE8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4_2_0719E9A84_2_0719E9A8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4_2_0719D6584_2_0719D658
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4_2_0719D2204_2_0719D220
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121610811_2_01216108
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121C19011_2_0121C190
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121F00711_2_0121F007
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121B32811_2_0121B328
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121C47011_2_0121C470
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121673011_2_01216730
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121C75211_2_0121C752
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121985811_2_01219858
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121BBD211_2_0121BBD2
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121CA3211_2_0121CA32
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_01214AD911_2_01214AD9
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121BEB011_2_0121BEB0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121E52811_2_0121E528
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121E51711_2_0121E517
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121357211_2_01213572
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0121B4F211_2_0121B4F2
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699B6E811_2_0699B6E8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699860811_2_06998608
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699D67011_2_0699D670
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699A40811_2_0699A408
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699BD3811_2_0699BD38
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699AA5811_2_0699AA58
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699C38811_2_0699C388
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_06998BF211_2_06998BF2
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699B0A011_2_0699B0A0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699D02811_2_0699D028
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_069911A011_2_069911A0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699C9D811_2_0699C9D8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_06995EB811_2_06995EB8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699B6D911_2_0699B6D9
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_06995EC811_2_06995EC8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699561811_2_06995618
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699560A11_2_0699560A
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699D66311_2_0699D663
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699373011_2_06993730
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699677811_2_06996778
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699676A11_2_0699676A
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699049811_2_06990498
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699749711_2_06997497
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699048811_2_06990488
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_069974A811_2_069974A8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699443011_2_06994430
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_069985FC11_2_069985FC
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_06990D3911_2_06990D39
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699BD2811_2_0699BD28
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_06997D5811_2_06997D58
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_06990D4811_2_06990D48
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_06997D4811_2_06997D48
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699AA4811_2_0699AA48
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_06995A7011_2_06995A70
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_06995A6011_2_06995A60
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_069933B811_2_069933B8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_069933A811_2_069933A8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_06996BD011_2_06996BD0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_06996BC111_2_06996BC1
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699A3F811_2_0699A3F8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699631211_2_06996312
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699632011_2_06996320
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699C37811_2_0699C378
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699B08F11_2_0699B08F
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_069908F011_2_069908F0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_069978F011_2_069978F0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_069908E011_2_069908E0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699281811_2_06992818
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699D01811_2_0699D018
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699280711_2_06992807
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699000611_2_06990006
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699705011_2_06997050
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699004011_2_06990040
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699704011_2_06997040
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699519811_2_06995198
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699119111_2_06991191
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699518A11_2_0699518A
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_069981B011_2_069981B0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_069981A011_2_069981A0
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699C9C811_2_0699C9C8
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_0699790011_2_06997900
                Source: FACTURAS PENDIENTES.exe, 00000004.00000002.1320114536.0000000002D8D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs FACTURAS PENDIENTES.exe
                Source: FACTURAS PENDIENTES.exe, 00000004.00000002.1325393907.0000000003D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs FACTURAS PENDIENTES.exe
                Source: FACTURAS PENDIENTES.exe, 00000004.00000000.1269971144.00000000007A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameZiDJYa.exeZ vs FACTURAS PENDIENTES.exe
                Source: FACTURAS PENDIENTES.exe, 00000004.00000002.1327783177.0000000005DA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs FACTURAS PENDIENTES.exe
                Source: FACTURAS PENDIENTES.exe, 00000004.00000002.1319121776.0000000000DFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs FACTURAS PENDIENTES.exe
                Source: FACTURAS PENDIENTES.exe, 00000004.00000002.1329679036.00000000074E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs FACTURAS PENDIENTES.exe
                Source: FACTURAS PENDIENTES.exe, 00000004.00000002.1320114536.0000000002D85000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs FACTURAS PENDIENTES.exe
                Source: FACTURAS PENDIENTES.exe, 0000000B.00000002.3736178006.0000000000D77000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs FACTURAS PENDIENTES.exe
                Source: FACTURAS PENDIENTES.exe, 0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs FACTURAS PENDIENTES.exe
                Source: FACTURAS PENDIENTES.exeBinary or memory string: OriginalFilenameZiDJYa.exeZ vs FACTURAS PENDIENTES.exe
                Source: FACTURAS PENDIENTES.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 11.2.FACTURAS PENDIENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 11.2.FACTURAS PENDIENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 11.2.FACTURAS PENDIENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 11.2.FACTURAS PENDIENTES.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000004.00000002.1325393907.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000004.00000002.1325393907.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 6176, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 6176, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 7332, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 7332, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: FACTURAS PENDIENTES.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, -.csBase64 encoded string: 'ItkMFjZb6Pv+5ngwlu9liDlfm7/ff7mjDjpfr3b3V/6LUqCpx2jLmcrOuJnV/dHS'
                Source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, -.csBase64 encoded string: 'ItkMFjZb6Pv+5ngwlu9liDlfm7/ff7mjDjpfr3b3V/6LUqCpx2jLmcrOuJnV/dHS'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, B1qUykbKVLW26IlZqa.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, B1qUykbKVLW26IlZqa.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, B1qUykbKVLW26IlZqa.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, dhGIktuRA9tmmZ30ug.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, dhGIktuRA9tmmZ30ug.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/6@2/2
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FACTURAS PENDIENTES.exe.logJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7340:120:WilError_03
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeMutant created: NULL
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_351yzufv.nkc.ps1Jump to behavior
                Source: FACTURAS PENDIENTES.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: FACTURAS PENDIENTES.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002F5A000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002F82000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3744428333.0000000003D8F000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002F3C000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002F4C000.00000004.00000800.00020000.00000000.sdmp, FACTURAS PENDIENTES.exe, 0000000B.00000002.3740949613.0000000002F8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: FACTURAS PENDIENTES.exeVirustotal: Detection: 54%
                Source: FACTURAS PENDIENTES.exeReversingLabs: Detection: 55%
                Source: unknownProcess created: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe"
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe"
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess created: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess created: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: FACTURAS PENDIENTES.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: FACTURAS PENDIENTES.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: FACTURAS PENDIENTES.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: ZiDJYa.pdbSHA256 source: FACTURAS PENDIENTES.exe
                Source: Binary string: ZiDJYa.pdb source: FACTURAS PENDIENTES.exe

                Data Obfuscation

                barindex
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, B1qUykbKVLW26IlZqa.cs.Net Code: VDgcEsGRWN System.Reflection.Assembly.Load(byte[])
                Source: 4.2.FACTURAS PENDIENTES.exe.2f96fb8.0.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                Source: 4.2.FACTURAS PENDIENTES.exe.5da0000.3.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                Source: FACTURAS PENDIENTES.exeStatic PE information: 0xF0B12B68 [Tue Dec 17 18:20:24 2097 UTC]
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4_2_05DC9981 push eax; ret 4_2_05DC998D
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4_2_05DC88F3 push eax; ret 4_2_05DC8919
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4_2_071504A0 pushfd ; ret 4_2_071504A1
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 4_2_071503BE push ds; ret 4_2_071503BF
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeCode function: 11_2_012124B9 push 8BFFFFFFh; retf 11_2_012124BF
                Source: FACTURAS PENDIENTES.exeStatic PE information: section name: .text entropy: 7.737203806991402
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, pnip7vcO5ASvatV4ej.csHigh entropy of concatenated method names: 'JUiW7hGIkt', 'TA9WbtmmZ3', 'EaBWHMpyKY', 'ncUW64jfbN', 'qW0WBif6CP', 'eYrWn2lJxn', 'B9vgqWu3QGUY7QMFYw', 'cGRPh1z2xlFVv7KC49', 'JPdWWQQMTZ', 'whXWiK7Arn'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, RpXBJaaaBMpyKYvcU4.csHigh entropy of concatenated method names: 'n49UMugMBE', 'SlHU10IMZx', 'yv6Uu0HtTf', 'pX6UaQeo31', 'RdYUBem80M', 'iM3UnarR26', 'yyEU5dF88o', 'lkLUYFDksS', 'wFZUABIFB9', 'fsPU3IlPO5'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, YxGXuXIK4i0wWKvs3b.csHigh entropy of concatenated method names: 'KImABA9MLi', 'JGhA5mSFMy', 'vH5AAfDpgd', 'TfsAlIrluY', 'rMdAdOJtEE', 'R4MAgatL0E', 'Dispose', 'kW2YKEjMf9', 'ihxY2XpmKb', 'b0YYUhdUDy'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, dvcOAoWiFCG8vbEpqqt.csHigh entropy of concatenated method names: 'GWyl9PS8Gh', 'lBClzPmoJT', 'ptAT4iAFLy', 'uf7oHPZDtf2SwqNBMWT', 'wPnN5jZc0JIFRUVQ8hH', 'l5Yh4uZeZENf5CddSU0', 'OC20qTZt69brxExTnxK', 'hULw7VZ1fkqGMZDZyn3'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, glNirwW4sjmOiKGsgG6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bP73hfrmce', 'p7t3wRswyE', 'lli3fuVyCE', 'hA53XNIMtu', 'JBX3DFaK0K', 'egG3mGDxl3', 'Aa03Rh9AAZ'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, YawANFfiKjfqm5in6V.csHigh entropy of concatenated method names: 'Xlfvuk2Av0', 'Cp6vaJKK8A', 'NIOv8Z8TZy', 'EA5vOO8q9g', 'B45vtExFbQ', 'GH5vCgrsIw', 'CP7vSWZAdU', 'ALyvpfYAX5', 'Qktvx8QOab', 'yI7vh9CIWZ'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, VRy2j4WcJQejrp2xW8V.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'IZqTAQfqeg', 'twST3Q5ooe', 'W1nTlPKO6M', 'Aa7TTOacrJ', 'L1ETd3rsDv', 'EOlTF55KNg', 'npaTgMlMHU'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, vKjSUfRWPU74ne9VVI.csHigh entropy of concatenated method names: 'S845HubMj9', 'nNA56GxpYZ', 'ToString', 'ycM5KUUJ4G', 'RUP52BXbhU', 'wOP5UKeQPA', 'Six5oyKU4J', 'lDY5NPgWIJ', 'gYe57uZJwU', 'nXs5bqTdhs'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, cLq68fUbnY8FJbah4q.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'RHVLjLKvRx', 'fPmL9agXE0', 'sTlLzGcxph', 'vJ2i4IOaXj', 'RxUiWGI0RU', 'YrFiLNqu8B', 'MExiiLc5sr', 'C72yMloO4ydZsquvm9J'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, jyJUKEWWGUZya4Xuu9y.csHigh entropy of concatenated method names: 'Owj3965Y8l', 'mRY3zYrEGe', 'QTSl4uBXIp', 'seblWwxYeK', 'VHYlLgSOAo', 'MYtlihXqpE', 'bNGlca4uhB', 'wC4lqapRHV', 'VtnlKOt39x', 'CXPl2crf0e'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, g73BDaLRaWdxRfxZcC.csHigh entropy of concatenated method names: 'DQ4Ep0c4F', 'x1eM4iyZV', 'JWb1PTroy', 'nojGpy2cd', 'y9Yap0AdW', 'acIQ0FYcW', 'NXu4c5fe1jOqX1O0VC', 'NlkqAuUyjjpC965dte', 'MknYIF1U3', 'vEO3Q4LMK'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, B1qUykbKVLW26IlZqa.csHigh entropy of concatenated method names: 'j7Ziqe4mdr', 'juMiKNK8PG', 'weJi2xfZ7q', 'c2niUUJ8ic', 'DfLiou7lGi', 'GOBiNSVf9k', 'mBgi7tq0Se', 'yWmib8ZLMr', 'd3di0564Aw', 'hEsiH6qL9O'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, nCPqYr82lJxnW5Ouij.csHigh entropy of concatenated method names: 'qWONqmj2gp', 'GO8N2AnKq2', 'wwQNoYwqxd', 'RgnN7XfxYX', 'HLPNbD6FiS', 'k23oZFIPEs', 'kyYosZOxCJ', 'eLIoINLjye', 'iugoPfyAm6', 'l1woj61eNb'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, XfbNFuQnElTL95W0if.csHigh entropy of concatenated method names: 'bpkokryVs4', 'MHkoGfSOhw', 'ruEUJHVp0v', 'LuwUt2ueDV', 'yQNUC7BMZj', 'tM6UrNXCRM', 'Os4USWqFA2', 'u19UplPfVN', 'NGTUyt1AR0', 'qNFUxgdfSI'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, w9LLl4ymrO3fS2e0b3.csHigh entropy of concatenated method names: 'IHU7VVrBwM', 'z3O7eUAWJi', 'jXe7E7RsNX', 'eVO7MhEh3W', 'el07k89Tvk', 'NkB71b5kn0', 'Axg7GO1NU4', 'kCO7uEYvui', 'IJa7aExNbI', 'HKA7QWUYr5'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, gJtLTF9aFePBsePbdb.csHigh entropy of concatenated method names: 'tAo3UOE7pU', 'hRq3oeIkr8', 'HPy3NLw465', 'noD37Z4Z7N', 'FcR3AR3S2D', 'qQu3b2rOvp', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, dhGIktuRA9tmmZ30ug.csHigh entropy of concatenated method names: 'Gla2XrDIZl', 'hQ32DBbihU', 'phM2mrkDLL', 'rNU2RWUjqK', 'FsT2Zx2QTv', 'MOG2sy0w64', 'sFo2IcV3sx', 'tTR2PHXv2v', 'mRc2jD6ohu', 'NUS29GgtpA'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, LKC7mD2CKKBPZrneGx.csHigh entropy of concatenated method names: 'Dispose', 'c0wWjWKvs3', 'YfsLOprlh1', 'tZS7U4bSAF', 'kB3W9bah1p', 'O90WzQRQ1v', 'ProcessDialogKey', 'trEL46xDRo', 'FhXLW9RQEG', 'yVMLLUJtLT'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, cqr7vctRPtbN2qXr3e.csHigh entropy of concatenated method names: 'FJpNgCq11e', 'zvBNVbSMfS', 'FdsNEZW6ra', 'jhYNM5F2oD', 'vnUN1QdcyT', 'jEtNGfu04D', 't7SNahi3QM', 'RVaNQXKcsR', 'uYH9Tk4R6lUod8BpTdB', 'I51Kpw4itQAum9KKJRC'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, z6xDRojQhX9RQEGVVM.csHigh entropy of concatenated method names: 'eHlA8ICNdy', 'X3YAOgHugQ', 'SYlAJwTvdG', 'BbmAt7dcZ9', 'CAaAC16Shs', 'F4EAryTCqw', 't1gASnRiFB', 'fb6AptsAJr', 'SnLAyRL5c9', 'YoGAxOe6qJ'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, L7a8F0Xnm58n9xNk9h.csHigh entropy of concatenated method names: 'g3eBxCbRwb', 'noGBwSnmKB', 'MWTBXQaaVx', 'iJsBDBE9ys', 'mZVBOJsMA6', 'zDaBJkFKxq', 'VYqBt2maR1', 'TFUBC7buft', 'j2MBr4DP3L', 'hyoBSsB5Wy'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, BB8qJesgPWhy1iwXTD.csHigh entropy of concatenated method names: 'W9q5PO1Tnr', 'uRf59Ol7eP', 'wQnY4hH2mu', 'DnOYWWnMMT', 'w125hntMUn', 'hoN5wVhsN6', 'feP5fiEtEV', 'TuV5XKC60R', 'BBX5DHXEhV', 'dwI5mjHUjy'
                Source: 4.2.FACTURAS PENDIENTES.exe.74e0000.4.raw.unpack, eL1PUnzXUyVOOSQSUZ.csHigh entropy of concatenated method names: 'PCB31SyytB', 'Mg63uXpNYp', 'hON3abSUv7', 'umr38j5I0U', 'wuq3Od6rJB', 'q8b3trnuZH', 'HGm3CT0wrH', 'YCs3gYceso', 'W8r3VRf6J8', 'LJ23eMcSm4'

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 6176, type: MEMORYSTR
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeMemory allocated: 2A80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeMemory allocated: 2D00000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeMemory allocated: 2B10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeMemory allocated: 1210000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeMemory allocated: 2D00000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeMemory allocated: 2B40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599891Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599666Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599344Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599234Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599125Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599016Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598906Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598797Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598687Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598578Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598469Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598356Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598250Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598140Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598031Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597922Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597812Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597699Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597593Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597484Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597375Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597266Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597156Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597047Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596938Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596828Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596719Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596609Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596500Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596391Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596281Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596172Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596063Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595938Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595813Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595688Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595577Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595469Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595344Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595121Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 594985Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 594841Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 594707Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 594344Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 594230Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 594078Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 593969Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 593859Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 593750Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8086Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1524Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeWindow / User API: threadDelayed 2190Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeWindow / User API: threadDelayed 7643Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 5296Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7532Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -27670116110564310s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -599891s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7556Thread sleep count: 2190 > 30Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7556Thread sleep count: 7643 > 30Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -599781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -599666s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -599562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -599453s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -599344s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -599234s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -599125s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -599016s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -598906s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -598797s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -598687s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -598578s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -598469s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -598356s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -598250s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -598140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -598031s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -597922s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -597812s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -597699s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -597593s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -597484s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -597375s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -597266s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -597156s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -597047s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -596938s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -596828s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -596719s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -596609s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -596500s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -596391s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -596281s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -596172s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -596063s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -595938s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -595813s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -595688s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -595577s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -595469s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -595344s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -595121s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -594985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -594841s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -594707s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -594344s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -594230s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -594078s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -593969s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -593859s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe TID: 7552Thread sleep time: -593750s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599891Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599666Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599344Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599234Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599125Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 599016Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598906Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598797Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598687Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598578Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598469Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598356Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598250Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598140Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 598031Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597922Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597812Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597699Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597593Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597484Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597375Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597266Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597156Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 597047Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596938Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596828Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596719Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596609Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596500Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596391Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596281Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596172Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 596063Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595938Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595813Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595688Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595577Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595469Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595344Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 595121Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 594985Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 594841Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 594707Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 594344Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 594230Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 594078Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 593969Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 593859Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeThread delayed: delay time: 593750Jump to behavior
                Source: FACTURAS PENDIENTES.exe, 0000000B.00000002.3736400763.0000000000E38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe"
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeMemory written: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeProcess created: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe "C:\Users\user\Desktop\FACTURAS PENDIENTES.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Users\user\Desktop\FACTURAS PENDIENTES.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.FACTURAS PENDIENTES.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3740949613.0000000002ECF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1325393907.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3740949613.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 6176, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 7332, type: MEMORYSTR
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\FACTURAS PENDIENTES.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 11.2.FACTURAS PENDIENTES.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1325393907.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 6176, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 7332, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.FACTURAS PENDIENTES.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FACTURAS PENDIENTES.exe.3d42d28.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.FACTURAS PENDIENTES.exe.3d22308.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.3735852536.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3740949613.0000000002ECF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1325393907.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3740949613.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 6176, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: FACTURAS PENDIENTES.exe PID: 7332, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                111
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Query Registry
                Remote Services1
                Email Collection
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                11
                Disable or Modify Tools
                LSASS Memory1
                Security Software Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                Process Injection
                NTDS31
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput Capture13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
                Obfuscated Files or Information
                Cached Domain Credentials1
                System Network Configuration Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Software Packing
                DCSync1
                File and Directory Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc Filesystem13
                System Information Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                DLL Side-Loading
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.