Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z1INVOICE4602-FMT25020147.scr.exe

Overview

General Information

Sample name:z1INVOICE4602-FMT25020147.scr.exe
Analysis ID:1631490
MD5:96564260f9abcab539243aae164715ad
SHA1:029ce85aea42c7bf60109d49a5fea314f9980e34
SHA256:218ea3221f1a07f6654e098dc86bd1a001790573d76cc8016dc9c69b93bc2cb9
Tags:exeuser-Porcupine
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • z1INVOICE4602-FMT25020147.scr.exe (PID: 4796 cmdline: "C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe" MD5: 96564260F9ABCAB539243AAE164715AD)
    • powershell.exe (PID: 4256 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 1816 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 4028 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp2A88.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 3680 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • GkrJfjIkIvsq.exe (PID: 1536 cmdline: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe MD5: 96564260F9ABCAB539243AAE164715AD)
    • schtasks.exe (PID: 616 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp34AA.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 4580 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "serverche399@gpsamsterdamqroup.com", "Password": "     j4YX(KT7UCZ1      ", "Host": "fiber13.dnsiaas.com", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "serverche399@gpsamsterdamqroup.com", "Password": "     j4YX(KT7UCZ1      ", "Host": "fiber13.dnsiaas.com", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x167a:$a1: get_encryptedPassword
        • 0x1993:$a2: get_encryptedUsername
        • 0x1498:$a3: get_timePasswordChanged
        • 0x1593:$a4: get_passwordField
        • 0x1690:$a5: set_encryptedPassword
        • 0x2cea:$a7: get_logins
        • 0x2c4d:$a10: KeyLoggerEventArgs
        • 0x28b2:$a11: KeyLoggerEventArgsEventHandler
        00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 23 entries
          SourceRuleDescriptionAuthorStrings
          0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                    Click to see the 43 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe", ParentImage: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe, ParentProcessId: 4796, ParentProcessName: z1INVOICE4602-FMT25020147.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe", ProcessId: 4256, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe", ParentImage: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe, ParentProcessId: 4796, ParentProcessName: z1INVOICE4602-FMT25020147.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe", ProcessId: 4256, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp34AA.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp34AA.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe, ParentImage: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe, ParentProcessId: 1536, ParentProcessName: GkrJfjIkIvsq.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp34AA.tmp", ProcessId: 616, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp2A88.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp2A88.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe", ParentImage: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe, ParentProcessId: 4796, ParentProcessName: z1INVOICE4602-FMT25020147.scr.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp2A88.tmp", ProcessId: 4028, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe", ParentImage: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe, ParentProcessId: 4796, ParentProcessName: z1INVOICE4602-FMT25020147.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe", ProcessId: 4256, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp2A88.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp2A88.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe", ParentImage: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe, ParentProcessId: 4796, ParentProcessName: z1INVOICE4602-FMT25020147.scr.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp2A88.tmp", ProcessId: 4028, ProcessName: schtasks.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-03-07T08:31:39.276705+010028032742Potentially Bad Traffic192.168.2.549708132.226.247.7380TCP
                    2025-03-07T08:31:41.620530+010028032742Potentially Bad Traffic192.168.2.549711132.226.247.7380TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "serverche399@gpsamsterdamqroup.com", "Password": " j4YX(KT7UCZ1 ", "Host": "fiber13.dnsiaas.com", "Port": "587"}
                    Source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "serverche399@gpsamsterdamqroup.com", "Password": " j4YX(KT7UCZ1 ", "Host": "fiber13.dnsiaas.com", "Port": "587", "Version": "4.4"}
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeReversingLabs: Detection: 39%
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeVirustotal: Detection: 33%Perma Link
                    Source: z1INVOICE4602-FMT25020147.scr.exeVirustotal: Detection: 33%Perma Link
                    Source: z1INVOICE4602-FMT25020147.scr.exeReversingLabs: Detection: 39%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpackString decryptor: serverche399@gpsamsterdamqroup.com
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpackString decryptor: j4YX(KT7UCZ1
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpackString decryptor: fiber13.dnsiaas.com
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpackString decryptor: lukasnakelogger@dklak.cam
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpackString decryptor: 587
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpackString decryptor:

                    Location Tracking

                    barindex
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: z1INVOICE4602-FMT25020147.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: z1INVOICE4602-FMT25020147.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                    Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                    Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                    Source: unknownDNS query: name: checkip.dyndns.org
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49711 -> 132.226.247.73:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49708 -> 132.226.247.73:80
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                    Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003241000.00000004.00000800.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003241000.00000004.00000800.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                    Source: RegSvcs.exe, 00000007.00000002.3305473597.0000000003339000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003306000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002C86000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                    Source: RegSvcs.exe, 00000007.00000002.3305473597.0000000003339000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.00000000032F9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003306000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002C72000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002C86000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                    Source: RegSvcs.exe, 00000007.00000002.3305473597.0000000003241000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3304054465.0000000000CA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                    Source: RegSvcs.exe, 0000000C.00000002.3304054465.0000000000CA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/U3hz
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                    Source: z1INVOICE4602-FMT25020147.scr.exe, GkrJfjIkIvsq.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                    Source: z1INVOICE4602-FMT25020147.scr.exe, GkrJfjIkIvsq.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                    Source: z1INVOICE4602-FMT25020147.scr.exe, GkrJfjIkIvsq.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                    Source: RegSvcs.exe, 00000007.00000002.3305473597.0000000003326000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002CA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2097473299.0000000002F43000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003241000.00000004.00000800.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2127026346.00000000028B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003241000.00000004.00000800.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                    Source: RegSvcs.exe, 00000007.00000002.3305473597.0000000003339000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003306000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002C86000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003306000.00000004.00000800.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002C86000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                    Source: RegSvcs.exe, 0000000C.00000002.3306199090.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                    Source: RegSvcs.exe, 00000007.00000002.3305473597.0000000003339000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                    Source: RegSvcs.exe, 00000007.00000002.3304591342.0000000001691000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189t
                    Source: z1INVOICE4602-FMT25020147.scr.exe, GkrJfjIkIvsq.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713

                    System Summary

                    barindex
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: z1INVOICE4602-FMT25020147.scr.exe PID: 4796, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: RegSvcs.exe PID: 3680, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: GkrJfjIkIvsq.exe PID: 1536, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: initial sampleStatic PE information: Filename: z1INVOICE4602-FMT25020147.scr.exe
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_02E43E400_2_02E43E40
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_02E46F900_2_02E46F90
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_02E46F990_2_02E46F99
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_02E4DA7C0_2_02E4DA7C
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_054505090_2_05450509
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_054505110_2_05450511
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_054505180_2_05450518
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_0749E7480_2_0749E748
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_0749E7580_2_0749E758
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_0749C6780_2_0749C678
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_0749B3000_2_0749B300
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_0749C2400_2_0749C240
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_0749EE080_2_0749EE08
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_0749EE180_2_0749EE18
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_0749DA710_2_0749DA71
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_0749DA800_2_0749DA80
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_074F25E20_2_074F25E2
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_074F44780_2_074F4478
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05729DE07_2_05729DE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05723E187_2_05723E18
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_057271187_2_05727118
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_057269B07_2_057269B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_057253707_2_05725370
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0572C2E37_2_0572C2E3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_057229EC7_2_057229EC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05723B837_2_05723B83
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05723AA17_2_05723AA1
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_026F3E408_2_026F3E40
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_026F6F908_2_026F6F90
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_026FDA7C8_2_026FDA7C
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7C6788_2_06D7C678
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7E7548_2_06D7E754
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7E7508_2_06D7E750
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7E7588_2_06D7E758
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7E7488_2_06D7E748
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7C2408_2_06D7C240
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7B3008_2_06D7B300
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7EE158_2_06D7EE15
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7EE108_2_06D7EE10
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7EE188_2_06D7EE18
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7EE088_2_06D7EE08
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7DA808_2_06D7DA80
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06D7DA718_2_06D7DA71
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06DD37918_2_06DD3791
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06DD19208_2_06DD1920
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06DD19118_2_06DD1911
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_011669A012_2_011669A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0116A08812_2_0116A088
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0116537012_2_01165370
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_0116C2E212_2_0116C2E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_01166FC812_2_01166FC8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_01163E0912_2_01163E09
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 12_2_011629E012_2_011629E0
                    Source: z1INVOICE4602-FMT25020147.scr.exeStatic PE information: invalid certificate
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2100915010.00000000072FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE.MUIj% vs z1INVOICE4602-FMT25020147.scr.exe
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2096254755.00000000010BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs z1INVOICE4602-FMT25020147.scr.exe
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2097473299.0000000002F43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs z1INVOICE4602-FMT25020147.scr.exe
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2101608777.0000000007540000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs z1INVOICE4602-FMT25020147.scr.exe
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2097473299.000000000313A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs z1INVOICE4602-FMT25020147.scr.exe
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs z1INVOICE4602-FMT25020147.scr.exe
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2100720897.0000000005AD0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs z1INVOICE4602-FMT25020147.scr.exe
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000000.2061543704.0000000000BCC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuUch.exe2 vs z1INVOICE4602-FMT25020147.scr.exe
                    Source: z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2097473299.00000000030BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs z1INVOICE4602-FMT25020147.scr.exe
                    Source: z1INVOICE4602-FMT25020147.scr.exeBinary or memory string: OriginalFilenameuUch.exe2 vs z1INVOICE4602-FMT25020147.scr.exe
                    Source: z1INVOICE4602-FMT25020147.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: z1INVOICE4602-FMT25020147.scr.exe PID: 4796, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: RegSvcs.exe PID: 3680, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: GkrJfjIkIvsq.exe PID: 1536, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: z1INVOICE4602-FMT25020147.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: GkrJfjIkIvsq.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, W---.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, W---.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, W---.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, EpiQCxc9VMC7hTOMpe.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, EpiQCxc9VMC7hTOMpe.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, nG2drGuyLS3vYjcIWy.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, nG2drGuyLS3vYjcIWy.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, nG2drGuyLS3vYjcIWy.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@16/11@2/2
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeFile created: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6972:120:WilError_03
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMutant created: \Sessions\1\BaseNamedObjects\iZGUnXkqDnGU
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6484:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5024:120:WilError_03
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2A88.tmpJump to behavior
                    Source: z1INVOICE4602-FMT25020147.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: z1INVOICE4602-FMT25020147.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: z1INVOICE4602-FMT25020147.scr.exeVirustotal: Detection: 33%
                    Source: z1INVOICE4602-FMT25020147.scr.exeReversingLabs: Detection: 39%
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeFile read: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe "C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe"
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp2A88.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp34AA.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp2A88.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp34AA.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: iconcodecservice.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: iconcodecservice.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: z1INVOICE4602-FMT25020147.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: z1INVOICE4602-FMT25020147.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, nG2drGuyLS3vYjcIWy.cs.Net Code: lcNc9qlIdv System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeCode function: 0_2_074F21B8 push eax; retf 0_2_074F21C5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05729A20 push esp; retf 057Ah7_2_05729D55
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeCode function: 8_2_06DD14E9 push eax; retf 8_2_06DD14F5
                    Source: z1INVOICE4602-FMT25020147.scr.exeStatic PE information: section name: .text entropy: 7.882709817311521
                    Source: GkrJfjIkIvsq.exe.0.drStatic PE information: section name: .text entropy: 7.882709817311521
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, lh5hsZomdT85ACCdiNO.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KWekbKq2tD', 'nefk2tW0TI', 'vwak6FRflB', 'H8Ak8yTZOB', 'B7pkAyibbo', 'WxekHYlQgC', 'Lxqku1J4SK'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, uwkooDokXoDLCodAved.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'WYrehaa18d', 'jZQekPtHmw', 'iKceGW434u', 'egceeunZAg', 'soFe1bG2kG', 'V1beIJ9G0v', 'E8ke5sTslW'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, R9Jb2E1RRiCCZVqkGb.csHigh entropy of concatenated method names: 't3DhTYuOFa', 'ihVhQfrkb2', 'xmfhhuvHrT', 'hoYhG1HU2o', 'Lleh1BdOxQ', 'Jiuh5wA1on', 'Dispose', 'g3twJBgBZM', 'inNwd7ohJU', 'UdtwlpDyWi'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, oOxDbagMJKZsNo2dvc.csHigh entropy of concatenated method names: 'K1CQmysmQr', 'AglQyef1lN', 'U9uwfZaS7u', 'uDnwglie3F', 'JsuQbufHTl', 'CmPQ2NXY82', 'XotQ6LGWnT', 'jBxQ8GAwd5', 'pCTQAGn2nl', 'cc9QHZDuqn'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, DoIiAEkyaQuHbqkTTb.csHigh entropy of concatenated method names: 'qWbgUGL8Bn', 'Q0NgRgF6bo', 'ME0gWSEeQ0', 's7igLDPvJb', 'a57gTcB0ur', 'tbqgXI0ik6', 'nAZyGsivk4VRKAJaS4', 'uFIXFxOE3VdHlLrcPD', 'drFggjnpNr', 'WmQgYoM0nl'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, v6JcNqIbwGd59rTITn.csHigh entropy of concatenated method names: 'HegU7lMyQP', 'V9LUsRKfdC', 'sBTU9H3WNA', 'dhoUPOl2rT', 'LALU3ShaWK', 'N0xUpalTWD', 'TXWUMEvm27', 'udJUvpxtHn', 'eptUCTp5LT', 'o4CUjVlY8B'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, hl1NWrzf5ApX52joGH.csHigh entropy of concatenated method names: 'slhkpUvSxU', 'gT8kvedE6u', 'q4gkCCNbEJ', 'rCbkO1OH98', 'fTHkZ0ovAr', 'xWDkKL96Py', 'kSFkihUcKJ', 'vExk5dVj0h', 'aRwk7dffR7', 'stMksmHJuA'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, uOsuhwSPiZwJl2c4KB.csHigh entropy of concatenated method names: 'd61klSxNOK', 'RwgkDHEiod', 'roIkNPpRt6', 'CTRkUIEEMS', 'EDDkhGYwCu', 'dNykRhO0HH', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, o7RATW4VOeD2rsFkoA.csHigh entropy of concatenated method names: 'ktM9DuRgc', 'zLdP7HqVV', 'Tgvp8fZdV', 'uZNMWSb56', 'YQQCpR2gx', 'iLQjWTWIC', 'JI2IXyD3yLf2UQ7RoO', 'eHYFf5RQTuJoRe1eqB', 'OZIwcLLu8', 'XnmkMln6H'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, fZxdHjHRl0qBPbcDqk.csHigh entropy of concatenated method names: 'ToString', 'alpXbSNdFx', 'rBsXZyM9Uo', 'XZqXnLj2GO', 'L7rXKRuHQI', 'eVKXiv8Vb0', 'yOIXaQX2Ot', 'g8IX4yayxn', 'FjWXSg6ESC', 'rW1XECsm0N'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, kH0TUWliFVklrn1hl0.csHigh entropy of concatenated method names: 'Dispose', 'aF8goJ7krs', 'L29rZ8xdSD', 'EY8ex1n9vx', 'qRRgyuLWkl', 'ASXgzBnWK3', 'ProcessDialogKey', 'OYPrfgmGHN', 'R5Orgy3Q9a', 'UG7rrJ1pUB'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, aB9kRLjR2sxxgVDd39.csHigh entropy of concatenated method names: 'fyJUJVE3KJ', 'cC2Ul1S8TQ', 'wYbUNV1CU5', 'x0JNyNH8TP', 'OccNzaiI6f', 'C9iUfW0sp8', 'j9IUg0KZqS', 'RhOUrBONRk', 'Xt5UYXYnB7', 'wIgUcJCsJw'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, WlSS2N5ftf7AGFj7Br.csHigh entropy of concatenated method names: 'iZwVvRdbuy', 'GFUVCyaVMg', 'gl8VOq68Kn', 'evIVZx383W', 'srYVKB67PQ', 'UeYViHBB2s', 'E8kV4nrU17', 'P8PVSQO9UO', 'bLmVFaYnCM', 'tGLVbkQAgL'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, nTTya6oolYRH8cRMYmk.csHigh entropy of concatenated method names: 'TfHkyI4KPB', 'HbdkzI5h4Y', 'Y9iGfUQGvD', 'vyDGg5YUES', 'DaCGrZ2Yk0', 'xUbGY4WHU9', 'Np6GcWlBML', 'hriGBGfu4D', 'ze7GJVVoYX', 'HQRGdQKV1M'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, A67Y8Mnf25Fm3Vmw4D.csHigh entropy of concatenated method names: 'PMJhO9rIyy', 'aK4hZFgNhC', 't2ThnwQ5hp', 'jAHhKOjHi4', 'dkjhiPHclC', 'mpQhasP6n6', 'wobh4I5FqI', 'q4MhSq6oLR', 'CKYhEynkPS', 'rmXhFosinw'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, uxhg1Kxs7TQimTxWrs.csHigh entropy of concatenated method names: 'CssNBERX8k', 'nRcNdEKExq', 'u9ANDx8j7Z', 'QALNUkD4Ch', 'XI7NRnRFHQ', 'UixDxqMbx4', 'OkQDtB9BNe', 'MJED0WgRAE', 'Qc2Dm86IgW', 'tQGDofR4Ir'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, MT41XGvQbGjqgQh3ER.csHigh entropy of concatenated method names: 'khYlP3CjDm', 'aWklpP063K', 'V0wlva07GG', 'QO4lCLPc72', 'jnilT1TvDU', 'lLmlXmKWpZ', 'll3lQeQqo9', 'UUDlwMWpIN', 'IEXlh0p6Kd', 'dlClkW0yvU'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, nG2drGuyLS3vYjcIWy.csHigh entropy of concatenated method names: 'ClCYBxOruo', 'bZCYJi40h1', 'lbkYdOUV3Q', 'F8jYl1g3MF', 'H5cYDAPnXl', 'joXYN2r2Gx', 'pSlYUpNVFF', 'kW2YR2g5it', 'Q5qYqxZa2N', 'PfVYWaP10c'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, einkfJEyGb8PYpPDBa.csHigh entropy of concatenated method names: 'Gn6TFo6402', 'tgdT2dQXfH', 'bDmT8FH1aF', 'RLQTAbOdvx', 'eWoTZKfc5i', 'TYZTnEPR5q', 'KdOTKe1aSu', 'sTLTiGAoWk', 'sEdTahAQ8Y', 'mq7T430tng'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, EpiQCxc9VMC7hTOMpe.csHigh entropy of concatenated method names: 'wG2d8pxNZW', 'WFadAegokQ', 'JWxdHPdCNn', 'nwoduZnieN', 'ImPdxN2Wfy', 'FLrdt1WAO6', 'tlFd0XHgUj', 'QHCdm7NlOO', 'LtddoCmSJo', 'PC0dy7d1iB'
                    Source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.7540000.5.raw.unpack, iiAm3Sb9rqhxvBmCMW.csHigh entropy of concatenated method names: 'qngQWXu42k', 'RRpQLaBQwM', 'ToString', 'HKrQJhmxLD', 'eGUQdxYqVb', 'igqQlTHMUU', 'YUPQDWjnD3', 'y7jQNwjghA', 'T1xQUjbM83', 'msfQRMVV0g'
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeFile created: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp2A88.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: z1INVOICE4602-FMT25020147.scr.exe PID: 4796, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: GkrJfjIkIvsq.exe PID: 1536, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory allocated: 2CD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory allocated: 2EA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory allocated: 4EA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory allocated: 7B90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory allocated: 8B90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory allocated: 8D40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory allocated: 9D40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory allocated: EE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory allocated: 2860000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory allocated: 4860000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory allocated: 6FD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory allocated: 7FD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory allocated: 8160000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory allocated: 9160000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599673Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599546Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598999Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598671Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598452Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598124Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598015Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597796Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597468Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597249Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597140Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596921Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596812Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596484Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596265Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596156Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596046Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595937Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595828Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595718Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595390Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595171Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595062Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594843Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594624Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599233Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599015Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598796Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598250Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598141Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597922Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597812Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597484Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597265Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597156Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597047Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596937Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596828Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596718Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596390Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596172Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596062Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595719Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595391Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595172Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594824Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6406Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3341Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1701Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8143Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8434Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1428Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe TID: 3396Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6528Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe TID: 4140Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599673Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599546Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598999Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598671Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598452Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598124Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598015Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597796Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597468Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597249Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597140Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596921Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596812Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596484Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596265Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596156Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596046Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595937Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595828Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595718Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595390Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595171Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595062Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594843Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594624Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599233Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599015Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598796Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598250Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598141Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597922Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597812Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597484Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597265Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597156Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597047Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596937Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596828Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596718Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596390Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596172Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596062Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595719Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595391Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595172Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594824Jump to behavior
                    Source: RegSvcs.exe, 0000000C.00000002.3304502364.0000000000D1C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll:
                    Source: GkrJfjIkIvsq.exe, 00000008.00000002.2123843014.00000000009E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                    Source: RegSvcs.exe, 00000007.00000002.3304591342.0000000001636000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe"
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 444000Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 446000Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 100E008Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 444000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 446000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 9BA008Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp2A88.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp34AA.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeQueries volume information: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeQueries volume information: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000007.00000002.3305473597.0000000003241000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3306199090.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: z1INVOICE4602-FMT25020147.scr.exe PID: 4796, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3680, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: GkrJfjIkIvsq.exe PID: 1536, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: z1INVOICE4602-FMT25020147.scr.exe PID: 4796, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3680, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: GkrJfjIkIvsq.exe PID: 1536, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: z1INVOICE4602-FMT25020147.scr.exe PID: 4796, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3680, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: GkrJfjIkIvsq.exe PID: 1536, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000007.00000002.3305473597.0000000003241000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3306199090.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: z1INVOICE4602-FMT25020147.scr.exe PID: 4796, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3680, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: GkrJfjIkIvsq.exe PID: 1536, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.4109f78.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.47492c8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.GkrJfjIkIvsq.exe.40c6b58.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z1INVOICE4602-FMT25020147.scr.exe.4705ea8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: z1INVOICE4602-FMT25020147.scr.exe PID: 4796, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3680, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: GkrJfjIkIvsq.exe PID: 1536, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    311
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping11
                    Security Software Discovery
                    Remote Services11
                    Archive Collected Data
                    12
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    11
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    31
                    Virtualization/Sandbox Evasion
                    Security Account Manager31
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput Capture13
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    System Network Configuration Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    File and Directory Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                    Software Packing
                    DCSync12
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1631490 Sample: z1INVOICE4602-FMT25020147.scr.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 46 reallyfreegeoip.org 2->46 48 checkip.dyndns.org 2->48 50 checkip.dyndns.com 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Sigma detected: Scheduled temp file as task from temp location 2->56 60 10 other signatures 2->60 8 z1INVOICE4602-FMT25020147.scr.exe 7 2->8         started        12 GkrJfjIkIvsq.exe 5 2->12         started        signatures3 58 Tries to detect the country of the analysis system (by using the IP) 46->58 process4 file5 34 C:\Users\user\AppData\...behaviorgraphkrJfjIkIvsq.exe, PE32 8->34 dropped 36 C:\Users\...behaviorgraphkrJfjIkIvsq.exe:Zone.Identifier, ASCII 8->36 dropped 38 C:\Users\user\AppData\Local\...\tmp2A88.tmp, XML 8->38 dropped 40 C:\...\z1INVOICE4602-FMT25020147.scr.exe.log, ASCII 8->40 dropped 62 Uses schtasks.exe or at.exe to add and modify task schedules 8->62 64 Writes to foreign memory regions 8->64 66 Allocates memory in foreign processes 8->66 68 Adds a directory exclusion to Windows Defender 8->68 14 powershell.exe 23 8->14         started        17 RegSvcs.exe 15 2 8->17         started        20 schtasks.exe 1 8->20         started        70 Multi AV Scanner detection for dropped file 12->70 72 Injects a PE file into a foreign processes 12->72 22 schtasks.exe 1 12->22         started        24 RegSvcs.exe 2 12->24         started        signatures6 process7 dnsIp8 74 Loading BitLocker PowerShell Module 14->74 26 WmiPrvSE.exe 14->26         started        28 conhost.exe 14->28         started        42 checkip.dyndns.com 132.226.247.73, 49708, 49711, 49729 UTMEMUS United States 17->42 44 reallyfreegeoip.org 104.21.32.1, 443, 49710, 49713 CLOUDFLARENETUS United States 17->44 30 conhost.exe 20->30         started        32 conhost.exe 22->32         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    z1INVOICE4602-FMT25020147.scr.exe33%VirustotalBrowse
                    z1INVOICE4602-FMT25020147.scr.exe39%ReversingLabs
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe39%ReversingLabs
                    C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe33%VirustotalBrowse
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    reallyfreegeoip.org
                    104.21.32.1
                    truefalse
                      high
                      checkip.dyndns.com
                      132.226.247.73
                      truefalse
                        high
                        checkip.dyndns.org
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          http://checkip.dyndns.org/false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://aborters.duckdns.org:8081z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003241000.00000004.00000800.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://reallyfreegeoip.org/xml/8.46.123.189RegSvcs.exe, 0000000C.00000002.3306199090.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.org/botz1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://anotherarmy.dns.army:8081z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003241000.00000004.00000800.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.org/U3hzRegSvcs.exe, 0000000C.00000002.3304054465.0000000000CA0000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.org/qz1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.org/xml/8.46.123.189$RegSvcs.exe, 00000007.00000002.3305473597.0000000003339000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://reallyfreegeoip.orgRegSvcs.exe, 00000007.00000002.3305473597.0000000003326000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002CA6000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://reallyfreegeoip.orgRegSvcs.exe, 00000007.00000002.3305473597.0000000003339000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003306000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002C86000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://checkip.dyndns.orgRegSvcs.exe, 00000007.00000002.3305473597.0000000003339000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.00000000032F9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003306000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002C72000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002C86000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.comRegSvcs.exe, 00000007.00000002.3305473597.0000000003339000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003306000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002C86000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002CB9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namez1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2097473299.0000000002F43000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003241000.00000004.00000800.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2127026346.00000000028B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.chiark.greenend.org.uk/~sgtatham/putty/0z1INVOICE4602-FMT25020147.scr.exe, GkrJfjIkIvsq.exe.0.drfalse
                                                      high
                                                      http://varders.kozow.com:8081z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003241000.00000004.00000800.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://reallyfreegeoip.org/xml/8.46.123.189tRegSvcs.exe, 00000007.00000002.3304591342.0000000001691000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedz1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://reallyfreegeoip.org/xml/z1INVOICE4602-FMT25020147.scr.exe, 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.3305473597.0000000003306000.00000004.00000800.00020000.00000000.sdmp, GkrJfjIkIvsq.exe, 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.3306199090.0000000002C86000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              104.21.32.1
                                                              reallyfreegeoip.orgUnited States
                                                              13335CLOUDFLARENETUSfalse
                                                              132.226.247.73
                                                              checkip.dyndns.comUnited States
                                                              16989UTMEMUSfalse
                                                              Joe Sandbox version:42.0.0 Malachite
                                                              Analysis ID:1631490
                                                              Start date and time:2025-03-07 08:30:41 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 7m 9s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:15
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:z1INVOICE4602-FMT25020147.scr.exe
                                                              Detection:MAL
                                                              Classification:mal100.troj.evad.winEXE@16/11@2/2
                                                              EGA Information:
                                                              • Successful, ratio: 50%
                                                              HCA Information:
                                                              • Successful, ratio: 99%
                                                              • Number of executed functions: 144
                                                              • Number of non-executed functions: 16
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com
                                                              • Execution Graph export aborted for target RegSvcs.exe, PID 3680 because it is empty
                                                              • Execution Graph export aborted for target RegSvcs.exe, PID 4580 because it is empty
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                              • Report size getting too big, too many NtCreateKey calls found.
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                              TimeTypeDescription
                                                              02:31:35API Interceptor1x Sleep call for process: z1INVOICE4602-FMT25020147.scr.exe modified
                                                              02:31:37API Interceptor11x Sleep call for process: powershell.exe modified
                                                              02:31:38API Interceptor1x Sleep call for process: GkrJfjIkIvsq.exe modified
                                                              02:33:18API Interceptor344x Sleep call for process: RegSvcs.exe modified
                                                              08:31:37Task SchedulerRun new task: GkrJfjIkIvsq path: C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              104.21.32.1Payment Invoice ref0306252.exeGet hashmaliciousFormBookBrowse
                                                              • www.rbopisalive.cyou/a669/
                                                              DHL AWB Receipt_pdf.bat.exeGet hashmaliciousFormBookBrowse
                                                              • www.rbopisalive.cyou/2dxw/
                                                              RFQ - 1239- PERSIAN GULF BIDBOLAND PDH PROJECT-PDF.exeGet hashmaliciousFormBookBrowse
                                                              • www.kdrqcyusevx.info/k7wl/
                                                              PRI_VTK250419A.exeGet hashmaliciousLokibotBrowse
                                                              • touxzw.ir/scc1/five/fre.php
                                                              Stormwater Works Drawings Spec.jsGet hashmaliciousFormBookBrowse
                                                              • www.tumbetgirislinki.fit/k566/
                                                              SFT20020117.exeGet hashmaliciousFormBookBrowse
                                                              • www.fz977.xyz/7p42/
                                                              PO from tpc Type 34.1 34,2 35 Spec.jsGet hashmaliciousFormBookBrowse
                                                              • www.tumbetgirislinki.fit/k566/
                                                              REQUEST FOR QUOTATION.exeGet hashmaliciousFormBookBrowse
                                                              • www.clouser.store/3r9x/
                                                              PO 87877889X,pdf.Vbs.vbsGet hashmaliciousFormBookBrowse
                                                              • www.tumbetgirislinki.fit/k566/
                                                              http://projectlombok.orgGet hashmaliciousUnknownBrowse
                                                              • projectlombok.org/
                                                              132.226.247.73Ziraat_Bankasi_Swift_Messaji.png.exeGet hashmaliciousMSIL Logger, MassLogger RAT, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              Repeat Order.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                              • checkip.dyndns.org/
                                                              HAWB772384266855 2846086773 G#U00f6nderinizinETGB .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              MEDUCK217841.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              SOA_TONG WOH ENTERPRISE SDN BHD.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              rRessourcestyrings.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              90939298323.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                              • checkip.dyndns.org/
                                                              Payment Advice.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                              • checkip.dyndns.org/
                                                              50% deposit's payment advice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              rPurchaseOrder-25-1201.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              reallyfreegeoip.orgYKBGunlukEkstre.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                              • 104.21.96.1
                                                              Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 104.21.112.1
                                                              Ziraat_Bankasi_Swift_Messaji.png.exeGet hashmaliciousMSIL Logger, MassLogger RAT, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • 104.21.64.1
                                                              Repeat Order.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                              • 104.21.16.1
                                                              March Shipment Documents.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 104.21.96.1
                                                              QUOTATION_FEBQUOTE312025#U00faPDF.scrGet hashmaliciousMSIL LoggerBrowse
                                                              • 104.21.48.1
                                                              rDoubleheartedness.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 104.21.64.1
                                                              PROFORMA INVOICE.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.80.1
                                                              SecuriteInfo.com.Win32.PWSX-gen.12871.17752.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.64.1
                                                              BL NO - SNKO05B250100198.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 104.21.112.1
                                                              checkip.dyndns.comYKBGunlukEkstre.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                              • 193.122.130.0
                                                              Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 132.226.8.169
                                                              Ziraat_Bankasi_Swift_Messaji.png.exeGet hashmaliciousMSIL Logger, MassLogger RAT, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • 132.226.247.73
                                                              Repeat Order.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                              • 132.226.247.73
                                                              March Shipment Documents.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 193.122.130.0
                                                              QUOTATION_FEBQUOTE312025#U00faPDF.scrGet hashmaliciousMSIL LoggerBrowse
                                                              • 132.226.8.169
                                                              rDoubleheartedness.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 132.226.8.169
                                                              PROFORMA INVOICE.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.6.168
                                                              SecuriteInfo.com.Win32.PWSX-gen.12871.17752.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.130.0
                                                              BL NO - SNKO05B250100198.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 193.122.6.168
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              UTMEMUSPurchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 132.226.8.169
                                                              Ziraat_Bankasi_Swift_Messaji.png.exeGet hashmaliciousMSIL Logger, MassLogger RAT, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                              • 132.226.247.73
                                                              Repeat Order.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                              • 132.226.247.73
                                                              QUOTATION_FEBQUOTE312025#U00faPDF.scrGet hashmaliciousMSIL LoggerBrowse
                                                              • 132.226.8.169
                                                              rDoubleheartedness.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 132.226.8.169
                                                              HAWB772384266855 2846086773 G#U00f6nderinizinETGB .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 132.226.247.73
                                                              SAGPU05R03 - 01-YS-00052201.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • 132.226.8.169
                                                              QUOTATION_FEBQUOTE312025#U00faPDF.scrGet hashmaliciousMSIL LoggerBrowse
                                                              • 132.226.8.169
                                                              MEDUCK217841.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • 132.226.247.73
                                                              Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • 132.226.8.169
                                                              CLOUDFLARENETUShttps://worker-rough-fire-759a.berwieberwieberwieberwieberwie.workers.dev/?eba=.htmGet hashmaliciousUnknownBrowse
                                                              • 172.67.206.91
                                                              Shipment_Docus_COSCO_20250307_35405649_pdf.bat.exeGet hashmaliciousLokibotBrowse
                                                              • 104.21.112.1
                                                              YKBGunlukEkstre.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                              • 104.21.96.1
                                                              Payment Invoice ref0306252.exeGet hashmaliciousFormBookBrowse
                                                              • 104.21.32.1
                                                              Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                              • 104.21.112.1
                                                              xworm.exeGet hashmaliciousXWormBrowse
                                                              • 104.20.3.235
                                                              bkHLzNaNMS.exeGet hashmaliciousUnknownBrowse
                                                              • 104.26.13.205
                                                              bkHLzNaNMS.exeGet hashmaliciousUnknownBrowse
                                                              • 104.26.13.205
                                                              ba.batGet hashmaliciousUnknownBrowse
                                                              • 162.159.134.42
                                                              datasheet.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 104.26.12.205
                                                              No context
                                                              No context
                                                              Process:C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1216
                                                              Entropy (8bit):5.34331486778365
                                                              Encrypted:false
                                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                              Malicious:false
                                                              Reputation:high, very likely benign file
                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                              Process:C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1216
                                                              Entropy (8bit):5.34331486778365
                                                              Encrypted:false
                                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                              Malicious:true
                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):2232
                                                              Entropy (8bit):5.3810236212315665
                                                              Encrypted:false
                                                              SSDEEP:48:lylWSU4xympgv4RIoUP7gZ9tK8NPZHUx7u1iMuge//8PUyus:lGLHxv2IfLZ2KRH6Oug8s
                                                              MD5:23CD070A7721E36DDF5C8E71F8D1FD3E
                                                              SHA1:4893763E45AFB4A77C815AE1A887047A46C130F1
                                                              SHA-256:601A6D49F6245C49A5CA7E3B91DB5E7E9EC07DCECEB9A7569CB389ACBA03230A
                                                              SHA-512:B6E96C74B82A9D667E0F139D2327C651FCC4B7CB18AEC6E825F6F6B3CF5865F79810962E86FEE34E30E75C29668B2D2571F1C533457BECC3344AB81CB888D8D7
                                                              Malicious:false
                                                              Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe
                                                              File Type:XML 1.0 document, ASCII text
                                                              Category:dropped
                                                              Size (bytes):1585
                                                              Entropy (8bit):5.113094524877874
                                                              Encrypted:false
                                                              SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtXxvn:cgergYrFdOFzOzN33ODOiDdKrsuThv
                                                              MD5:83F0D9BE5522E8DDB6B272769ED23986
                                                              SHA1:60D70E2891F7EC8886B95C3996C4463158D6C81E
                                                              SHA-256:60B4A2D943FFEFB86B5791460E6BE17984E57901140F3C7E3710D05CAD8E0EB5
                                                              SHA-512:E7F887DBC5DF3AEF1380B7B919D7FD36052B1611C0654E32ED6F29EB0BBECBC6AE9FA94EBB2DAD03404F26D70D871965323F98C2D150193D895B2031C0CDB8E4
                                                              Malicious:true
                                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                              Process:C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe
                                                              File Type:XML 1.0 document, ASCII text
                                                              Category:dropped
                                                              Size (bytes):1585
                                                              Entropy (8bit):5.113094524877874
                                                              Encrypted:false
                                                              SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtXxvn:cgergYrFdOFzOzN33ODOiDdKrsuThv
                                                              MD5:83F0D9BE5522E8DDB6B272769ED23986
                                                              SHA1:60D70E2891F7EC8886B95C3996C4463158D6C81E
                                                              SHA-256:60B4A2D943FFEFB86B5791460E6BE17984E57901140F3C7E3710D05CAD8E0EB5
                                                              SHA-512:E7F887DBC5DF3AEF1380B7B919D7FD36052B1611C0654E32ED6F29EB0BBECBC6AE9FA94EBB2DAD03404F26D70D871965323F98C2D150193D895B2031C0CDB8E4
                                                              Malicious:false
                                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                              Process:C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):708616
                                                              Entropy (8bit):7.874843997410482
                                                              Encrypted:false
                                                              SSDEEP:12288:zql+0LeY8o6CPjfkzrtCf+8/ganR6Kfk/yMCX/aIZj/iYfA0vTwf7LBn624F5oNy:zU++eYJ64j6Jg6KfKVsas/Bf/ILBn62K
                                                              MD5:96564260F9ABCAB539243AAE164715AD
                                                              SHA1:029CE85AEA42C7BF60109D49A5FEA314F9980E34
                                                              SHA-256:218EA3221F1A07F6654E098DC86BD1A001790573D76CC8016DC9C69B93BC2CB9
                                                              SHA-512:55A796780967434B45338A7FD225F1D8B05FA840F3117D1AB38AF11256AF07A08ED653B368C0E17D1AD299B8AD0ACBC317B2AF8E0992C9806272C784AFD19732
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 39%
                                                              • Antivirus: Virustotal, Detection: 33%, Browse
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...No.g..............0.................. ........@.. ....................................@....................................O........................6........................................................... ............... ..H............text...4.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........J...7..............!..........................................z..}......}.....(.......(.....*..0..@..........}.....{.....{....o....r...p.{....o.....o....o....(....o.....*.0............o..........,...{....o....&.*...0............{....o.....{....o.....o....o....o......,7...}.....{....r...p.{....o.....o....o....(....o......+5...}.....{....r...p.{....o.....o....o....(....o......*.0...........#........%....{....o....(......#.-DT.!.@Z#......f@[.r...p..{.........,0.r...p..
                                                              Process:C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):26
                                                              Entropy (8bit):3.95006375643621
                                                              Encrypted:false
                                                              SSDEEP:3:ggPYV:rPYV
                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                              Malicious:true
                                                              Preview:[ZoneTransfer]....ZoneId=0
                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Entropy (8bit):7.874843997410482
                                                              TrID:
                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                                              • Win32 Executable (generic) a (10002005/4) 49.93%
                                                              • Windows Screen Saver (13104/52) 0.07%
                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                              • DOS Executable Generic (2002/1) 0.01%
                                                              File name:z1INVOICE4602-FMT25020147.scr.exe
                                                              File size:708'616 bytes
                                                              MD5:96564260f9abcab539243aae164715ad
                                                              SHA1:029ce85aea42c7bf60109d49a5fea314f9980e34
                                                              SHA256:218ea3221f1a07f6654e098dc86bd1a001790573d76cc8016dc9c69b93bc2cb9
                                                              SHA512:55a796780967434b45338a7fd225f1d8b05fa840f3117d1ab38af11256af07a08ed653b368c0e17d1ad299b8ad0acbc317b2af8e0992c9806272c784afd19732
                                                              SSDEEP:12288:zql+0LeY8o6CPjfkzrtCf+8/ganR6Kfk/yMCX/aIZj/iYfA0vTwf7LBn624F5oNy:zU++eYJ64j6Jg6KfKVsas/Bf/ILBn62K
                                                              TLSH:06E412E87958D812DEE90BB04271E77A5379BEACE911D3038EECACDF3851720A51D712
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...No.g..............0.................. ........@.. ....................................@................................
                                                              Icon Hash:7549656d6d398e8d
                                                              Entrypoint:0x4aa32e
                                                              Entrypoint Section:.text
                                                              Digitally signed:true
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x67CA6F4E [Fri Mar 7 04:00:14 2025 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                              Signature Valid:false
                                                              Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                                              Signature Validation Error:The digital signature of the object did not verify
                                                              Error Number:-2146869232
                                                              Not Before, Not After
                                                              • 13/11/2018 01:00:00 09/11/2021 00:59:59
                                                              Subject Chain
                                                              • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                                              Version:3
                                                              Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                                              Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                                              Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                                              Serial:7C1118CBBADC95DA3752C46E47A27438
                                                              Instruction
                                                              jmp dword ptr [00402000h]
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xaa2dc0x4f.text
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x10c4.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0xa9a000x3608
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x20000xa83340xa8400ac09b8e44e9bf2978a76973f5f9829d4False0.9409462643945022data7.882709817311521IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rsrc0xac0000x10c40x120055cd11ebd82af0a6a4887ed24c2e0bbbFalse0.7133246527777778data6.446152893656869IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0xae0000xc0x200ce3e264c39b112bfa69c0ccba9626b5aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0xac0c80xc7aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8810269254852849
                                                              RT_GROUP_ICON0xacd540x14data1.05
                                                              RT_VERSION0xacd780x348data0.4357142857142857
                                                              DLLImport
                                                              mscoree.dll_CorExeMain
                                                              DescriptionData
                                                              Translation0x0000 0x04b0
                                                              CommentsExternalDSL
                                                              CompanyNameWF_SINCOS
                                                              FileDescriptionWF LOGIN
                                                              FileVersion1.1.2.2
                                                              InternalNameuUch.exe
                                                              LegalCopyrightWF_SINCOS 2024 (C)
                                                              LegalTrademarksExternalDSL
                                                              OriginalFilenameuUch.exe
                                                              ProductNameWF-LOGIN
                                                              ProductVersion1.1.2.2
                                                              Assembly Version1.1.0.0
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2025-03-07T08:31:39.276705+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549708132.226.247.7380TCP
                                                              2025-03-07T08:31:41.620530+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549711132.226.247.7380TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Mar 7, 2025 08:31:38.186741114 CET4970880192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:31:38.192236900 CET8049708132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:31:38.192310095 CET4970880192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:31:38.192492962 CET4970880192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:31:38.198451996 CET8049708132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:31:39.012908936 CET8049708132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:31:39.017469883 CET4970880192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:31:39.022532940 CET8049708132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:31:39.226174116 CET8049708132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:31:39.276705027 CET4970880192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:31:39.315749884 CET49710443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:31:39.315782070 CET44349710104.21.32.1192.168.2.5
                                                              Mar 7, 2025 08:31:39.316004038 CET49710443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:31:39.321626902 CET49710443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:31:39.321640968 CET44349710104.21.32.1192.168.2.5
                                                              Mar 7, 2025 08:31:40.674405098 CET4971180192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:31:40.680351973 CET8049711132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:31:40.680593014 CET4971180192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:31:40.680855989 CET4971180192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:31:40.686362028 CET8049711132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:31:41.362386942 CET8049711132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:31:41.365888119 CET4971180192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:31:41.370969057 CET8049711132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:31:41.573961973 CET8049711132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:31:41.603737116 CET49713443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:31:41.603768110 CET44349713104.21.32.1192.168.2.5
                                                              Mar 7, 2025 08:31:41.604329109 CET49713443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:31:41.608275890 CET49713443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:31:41.608288050 CET44349713104.21.32.1192.168.2.5
                                                              Mar 7, 2025 08:31:41.620529890 CET4971180192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:32:44.226283073 CET8049708132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:32:44.226336002 CET4970880192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:32:46.575228930 CET8049711132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:32:46.575325966 CET4971180192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:33:19.230345964 CET4970880192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:33:19.236823082 CET8049708132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:33:19.370909929 CET49710443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:33:19.416336060 CET44349710104.21.32.1192.168.2.5
                                                              Mar 7, 2025 08:33:19.442687988 CET4972980192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:33:19.452384949 CET8049729132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:33:19.453984022 CET4972980192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:33:19.453984976 CET4972980192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:33:19.459364891 CET8049729132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:33:20.135396957 CET8049729132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:33:20.141201973 CET49730443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:33:20.141257048 CET44349730104.21.32.1192.168.2.5
                                                              Mar 7, 2025 08:33:20.141366005 CET49730443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:33:20.141789913 CET49730443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:33:20.141824961 CET44349730104.21.32.1192.168.2.5
                                                              Mar 7, 2025 08:33:20.183267117 CET4972980192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:33:21.606004953 CET4971180192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:33:21.611093998 CET8049711132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:33:21.612710953 CET49713443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:33:21.618813992 CET4973180192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:33:21.624011993 CET8049731132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:33:21.624135017 CET4973180192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:33:21.624250889 CET4973180192.168.2.5132.226.247.73
                                                              Mar 7, 2025 08:33:21.629379034 CET8049731132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:33:21.656369925 CET44349713104.21.32.1192.168.2.5
                                                              Mar 7, 2025 08:33:22.328167915 CET8049731132.226.247.73192.168.2.5
                                                              Mar 7, 2025 08:33:22.332154036 CET49732443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:33:22.332192898 CET44349732104.21.32.1192.168.2.5
                                                              Mar 7, 2025 08:33:22.332257986 CET49732443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:33:22.332657099 CET49732443192.168.2.5104.21.32.1
                                                              Mar 7, 2025 08:33:22.332668066 CET44349732104.21.32.1192.168.2.5
                                                              Mar 7, 2025 08:33:22.369820118 CET4973180192.168.2.5132.226.247.73
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Mar 7, 2025 08:31:38.169858932 CET4931553192.168.2.51.1.1.1
                                                              Mar 7, 2025 08:31:38.177134037 CET53493151.1.1.1192.168.2.5
                                                              Mar 7, 2025 08:31:39.296582937 CET5542053192.168.2.51.1.1.1
                                                              Mar 7, 2025 08:31:39.315098047 CET53554201.1.1.1192.168.2.5
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Mar 7, 2025 08:31:38.169858932 CET192.168.2.51.1.1.10xf76fStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                              Mar 7, 2025 08:31:39.296582937 CET192.168.2.51.1.1.10x9735Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Mar 7, 2025 08:31:38.177134037 CET1.1.1.1192.168.2.50xf76fNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                              Mar 7, 2025 08:31:38.177134037 CET1.1.1.1192.168.2.50xf76fNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                              Mar 7, 2025 08:31:38.177134037 CET1.1.1.1192.168.2.50xf76fNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                              Mar 7, 2025 08:31:38.177134037 CET1.1.1.1192.168.2.50xf76fNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                              Mar 7, 2025 08:31:38.177134037 CET1.1.1.1192.168.2.50xf76fNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                              Mar 7, 2025 08:31:38.177134037 CET1.1.1.1192.168.2.50xf76fNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                              Mar 7, 2025 08:31:39.315098047 CET1.1.1.1192.168.2.50x9735No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                              Mar 7, 2025 08:31:39.315098047 CET1.1.1.1192.168.2.50x9735No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                              Mar 7, 2025 08:31:39.315098047 CET1.1.1.1192.168.2.50x9735No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                              Mar 7, 2025 08:31:39.315098047 CET1.1.1.1192.168.2.50x9735No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                              Mar 7, 2025 08:31:39.315098047 CET1.1.1.1192.168.2.50x9735No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                              Mar 7, 2025 08:31:39.315098047 CET1.1.1.1192.168.2.50x9735No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                              Mar 7, 2025 08:31:39.315098047 CET1.1.1.1192.168.2.50x9735No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                              • checkip.dyndns.org
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.549708132.226.247.73803680C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              TimestampBytes transferredDirectionData
                                                              Mar 7, 2025 08:31:38.192492962 CET151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              Mar 7, 2025 08:31:39.012908936 CET273INHTTP/1.1 200 OK
                                                              Date: Fri, 07 Mar 2025 07:31:38 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 104
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                              Mar 7, 2025 08:31:39.017469883 CET127OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Mar 7, 2025 08:31:39.226174116 CET273INHTTP/1.1 200 OK
                                                              Date: Fri, 07 Mar 2025 07:31:39 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 104
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.549711132.226.247.73804580C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              TimestampBytes transferredDirectionData
                                                              Mar 7, 2025 08:31:40.680855989 CET151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              Mar 7, 2025 08:31:41.362386942 CET273INHTTP/1.1 200 OK
                                                              Date: Fri, 07 Mar 2025 07:31:41 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 104
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                              Mar 7, 2025 08:31:41.365888119 CET127OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Mar 7, 2025 08:31:41.573961973 CET273INHTTP/1.1 200 OK
                                                              Date: Fri, 07 Mar 2025 07:31:41 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 104
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              2192.168.2.549729132.226.247.73803680C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              TimestampBytes transferredDirectionData
                                                              Mar 7, 2025 08:33:19.453984976 CET151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              Mar 7, 2025 08:33:20.135396957 CET273INHTTP/1.1 200 OK
                                                              Date: Fri, 07 Mar 2025 07:33:20 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 104
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              3192.168.2.549731132.226.247.73804580C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              TimestampBytes transferredDirectionData
                                                              Mar 7, 2025 08:33:21.624250889 CET151OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                              Host: checkip.dyndns.org
                                                              Connection: Keep-Alive
                                                              Mar 7, 2025 08:33:22.328167915 CET273INHTTP/1.1 200 OK
                                                              Date: Fri, 07 Mar 2025 07:33:22 GMT
                                                              Content-Type: text/html
                                                              Content-Length: 104
                                                              Connection: keep-alive
                                                              Cache-Control: no-cache
                                                              Pragma: no-cache
                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:02:31:35
                                                              Start date:07/03/2025
                                                              Path:C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\z1INVOICE4602-FMT25020147.scr.exe"
                                                              Imagebase:0xb20000
                                                              File size:708'616 bytes
                                                              MD5 hash:96564260F9ABCAB539243AAE164715AD
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2098615391.0000000004705000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:3
                                                              Start time:02:31:36
                                                              Start date:07/03/2025
                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe"
                                                              Imagebase:0xe00000
                                                              File size:433'152 bytes
                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:4
                                                              Start time:02:31:36
                                                              Start date:07/03/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff6d64d0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:5
                                                              Start time:02:31:36
                                                              Start date:07/03/2025
                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp2A88.tmp"
                                                              Imagebase:0x130000
                                                              File size:187'904 bytes
                                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:6
                                                              Start time:02:31:36
                                                              Start date:07/03/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff6d64d0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:7
                                                              Start time:02:31:36
                                                              Start date:07/03/2025
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                              Imagebase:0xfb0000
                                                              File size:45'984 bytes
                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000007.00000002.3303268355.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000007.00000002.3305473597.0000000003241000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:high
                                                              Has exited:false

                                                              Target ID:8
                                                              Start time:02:31:37
                                                              Start date:07/03/2025
                                                              Path:C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Users\user\AppData\Roaming\GkrJfjIkIvsq.exe
                                                              Imagebase:0x4e0000
                                                              File size:708'616 bytes
                                                              MD5 hash:96564260F9ABCAB539243AAE164715AD
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000008.00000002.2129360756.00000000040C6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                              Antivirus matches:
                                                              • Detection: 39%, ReversingLabs
                                                              • Detection: 33%, Virustotal, Browse
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:9
                                                              Start time:02:31:37
                                                              Start date:07/03/2025
                                                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                              Imagebase:0x7ff6ef0c0000
                                                              File size:496'640 bytes
                                                              MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                              Has elevated privileges:true
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:10
                                                              Start time:02:31:39
                                                              Start date:07/03/2025
                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GkrJfjIkIvsq" /XML "C:\Users\user\AppData\Local\Temp\tmp34AA.tmp"
                                                              Imagebase:0x130000
                                                              File size:187'904 bytes
                                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:11
                                                              Start time:02:31:39
                                                              Start date:07/03/2025
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff6d64d0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:12
                                                              Start time:02:31:39
                                                              Start date:07/03/2025
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                              Imagebase:0x790000
                                                              File size:45'984 bytes
                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000C.00000002.3306199090.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:high
                                                              Has exited:false

                                                              Reset < >