Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TR3lYZyOE3.exe

Overview

General Information

Sample name:TR3lYZyOE3.exe
renamed because original name is a hash value
Original sample name:57be4ec7980a2d28a02541067688d47feecf59e71fdb022aa93fe84c04429c55.exe
Analysis ID:1631793
MD5:80cd38e054f47508964df6f56e28d583
SHA1:405ce42b6c9d038ea42d0d1d9d9c118c65e5ba27
SHA256:57be4ec7980a2d28a02541067688d47feecf59e71fdb022aa93fe84c04429c55
Tags:exeuser-adrian__luca
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
System process connects to network (likely due to code injection or exploit)
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
Drops VBS files to the startup folder
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Sample uses string decryption to hide its real strings
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • TR3lYZyOE3.exe (PID: 6924 cmdline: "C:\Users\user\Desktop\TR3lYZyOE3.exe" MD5: 80CD38E054F47508964DF6F56E28D583)
    • Hegeleos.exe (PID: 7164 cmdline: "C:\Users\user\Desktop\TR3lYZyOE3.exe" MD5: 80CD38E054F47508964DF6F56E28D583)
      • svchost.exe (PID: 6284 cmdline: "C:\Users\user\Desktop\TR3lYZyOE3.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • Hegeleos.exe (PID: 6288 cmdline: "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe" MD5: 80CD38E054F47508964DF6F56E28D583)
        • svchost.exe (PID: 4088 cmdline: "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • wscript.exe (PID: 4564 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • Hegeleos.exe (PID: 5912 cmdline: "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe" MD5: 80CD38E054F47508964DF6F56E28D583)
      • svchost.exe (PID: 7152 cmdline: "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Bot Token": "7339564661:AAFzTB6gEWMndjXYyD5LCn17UEBISRR8wDI", "Chat id": "6443825857", "Email ID": "sales-nguyen@vvtrade.vn", "Password": "qVyP6qyv6MQCmZJBRs4t", "Host": "mail.vvtrade.vn", "Port": "587"}
{"Exfil Mode": "Telegram", "Username": "sales-nguyen@vvtrade.vn", "Password": "qVyP6qyv6MQCmZJBRs4t", "Host": "mail.vvtrade.vn", "Port": "587", "Token": "7339564661:AAFzTB6gEWMndjXYyD5LCn17UEBISRR8wDI", "Chat_id": "6443825857", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.1304494588.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x1300:$s3: 83 EC 38 53 B0 62 88 44 24 2B 88 44 24 2F B0 08 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1fdd0:$s5: delete[]
  • 0x1f288:$s6: constructor or from DllMain.
00000007.00000002.1219278739.0000000002BF0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 62 88 44 24 2B 88 44 24 2F B0 08 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000005.00000002.1241609998.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x1300:$s3: 83 EC 38 53 B0 62 88 44 24 2B 88 44 24 2F B0 08 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1fdd0:$s5: delete[]
  • 0x1f288:$s6: constructor or from DllMain.
00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      Click to see the 62 entries
      SourceRuleDescriptionAuthorStrings
      9.2.svchost.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x1300:$s3: 83 EC 38 53 B0 62 88 44 24 2B 88 44 24 2F B0 08 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1fdd0:$s5: delete[]
      • 0x1f288:$s6: constructor or from DllMain.
      9.3.svchost.exe.345cf20.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        9.3.svchost.exe.345cf20.1.raw.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
          9.3.svchost.exe.345cf20.1.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            9.3.svchost.exe.345cf20.1.raw.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x352af:$a1: get_encryptedPassword
            • 0x35283:$a2: get_encryptedUsername
            • 0x35347:$a3: get_timePasswordChanged
            • 0x3525f:$a4: get_passwordField
            • 0x352c5:$a5: set_encryptedPassword
            • 0x35092:$a7: get_logins
            • 0x30956:$a10: KeyLoggerEventArgs
            • 0x30925:$a11: KeyLoggerEventArgsEventHandler
            • 0x35166:$a13: _encryptedPassword
            Click to see the 218 entries

            System Summary

            barindex
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4076, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbs" , ProcessId: 4564, ProcessName: wscript.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\TR3lYZyOE3.exe", CommandLine: "C:\Users\user\Desktop\TR3lYZyOE3.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\TR3lYZyOE3.exe", ParentImage: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe, ParentProcessId: 7164, ParentProcessName: Hegeleos.exe, ProcessCommandLine: "C:\Users\user\Desktop\TR3lYZyOE3.exe", ProcessId: 6284, ProcessName: svchost.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4076, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbs" , ProcessId: 4564, ProcessName: wscript.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\TR3lYZyOE3.exe", CommandLine: "C:\Users\user\Desktop\TR3lYZyOE3.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\TR3lYZyOE3.exe", ParentImage: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe, ParentProcessId: 7164, ParentProcessName: Hegeleos.exe, ProcessCommandLine: "C:\Users\user\Desktop\TR3lYZyOE3.exe", ProcessId: 6284, ProcessName: svchost.exe

            Data Obfuscation

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe, ProcessId: 7164, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbs
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: TR3lYZyOE3.exeAvira: detected
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeAvira: detection malicious, Label: TR/AD.ShellcodeCrypter.yqnyr
            Source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Bot Token": "7339564661:AAFzTB6gEWMndjXYyD5LCn17UEBISRR8wDI", "Chat id": "6443825857", "Email ID": "sales-nguyen@vvtrade.vn", "Password": "qVyP6qyv6MQCmZJBRs4t", "Host": "mail.vvtrade.vn", "Port": "587"}
            Source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Username": "sales-nguyen@vvtrade.vn", "Password": "qVyP6qyv6MQCmZJBRs4t", "Host": "mail.vvtrade.vn", "Port": "587", "Token": "7339564661:AAFzTB6gEWMndjXYyD5LCn17UEBISRR8wDI", "Chat_id": "6443825857", "Version": "4.4"}
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeReversingLabs: Detection: 65%
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeVirustotal: Detection: 72%Perma Link
            Source: TR3lYZyOE3.exeVirustotal: Detection: 72%Perma Link
            Source: TR3lYZyOE3.exeReversingLabs: Detection: 65%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 5.3.svchost.exe.2a5f000.1.unpackString decryptor: sales-nguyen@vvtrade.vn
            Source: 5.3.svchost.exe.2a5f000.1.unpackString decryptor: qVyP6qyv6MQCmZJBRs4t
            Source: 5.3.svchost.exe.2a5f000.1.unpackString decryptor: mail.vvtrade.vn
            Source: 5.3.svchost.exe.2a5f000.1.unpackString decryptor: saleseuropower@yandex.com
            Source: 5.3.svchost.exe.2a5f000.1.unpackString decryptor: 587
            Source: 5.3.svchost.exe.2a5f000.1.unpackString decryptor: 7339564661:AAFzTB6gEWMndjXYyD5LCn17UEBISRR8wDI
            Source: 5.3.svchost.exe.2a5f000.1.unpackString decryptor: 6443825857
            Source: 5.3.svchost.exe.2a5f000.1.unpackString decryptor:
            Source: TR3lYZyOE3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb\??\C:\Windows\Fonts\staticcache.dat source: svchost.exe, 00000005.00000002.1242307413.0000000002A83000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdbC:\Windows\assembly\GAC_64 source: svchost.exe, 00000009.00000003.1274782575.00000000034EC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: _.pdb source: svchost.exe, 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: Hegeleos.exe, 00000002.00000003.1103230603.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000002.00000003.1102923247.0000000004000000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000004.00000003.1120950370.0000000003F00000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000004.00000003.1119985209.00000000040A0000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000007.00000003.1215461077.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000007.00000003.1218286961.0000000004070000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Hegeleos.exe, 00000002.00000003.1103230603.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000002.00000003.1102923247.0000000004000000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000004.00000003.1120950370.0000000003F00000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000004.00000003.1119985209.00000000040A0000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000007.00000003.1215461077.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000007.00000003.1218286961.0000000004070000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,2_2_004339B6
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00452492
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00442886
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_004788BD
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,2_2_0045CAFA
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00431A86
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,2_2_0044BD27
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0045DE8F FindFirstFileW,FindClose,2_2_0045DE8F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0044BF8B
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,4_2_004339B6
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,4_2_00452492
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_00442886
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,4_2_004788BD
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,4_2_0045CAFA
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_00431A86
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,4_2_0044BD27
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0045DE8F FindFirstFileW,FindClose,4_2_0045DE8F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,4_2_0044BF8B
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior

            Networking

            barindex
            Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 158.101.44.242 80Jump to behavior
            Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: svchost.exe, 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
            Source: svchost.exe, 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243237842.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306003093.00000000055E1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
            Source: svchost.exe, 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243237842.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306003093.00000000055E1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
            Source: svchost.exe, 00000005.00000002.1243237842.0000000004C07000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306003093.00000000056A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: svchost.exe, 00000005.00000002.1243237842.0000000004BF3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243237842.0000000004C07000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306003093.00000000056A7000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306003093.000000000569A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: svchost.exe, 00000005.00000002.1243237842.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306003093.00000000055E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: svchost.exe, 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: svchost.exe, 00000005.00000002.1243237842.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306003093.00000000055E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: svchost.exe, 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243237842.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306003093.00000000055E1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
            Source: svchost.exe, 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: svchost.exe, 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_0045A10F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,4_2_0045A10F
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0047C81C SendMessageW,NtdllDialogWndProc_W,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,SetCapture,ClientToScreen,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,0_2_0047C81C
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0047C81C SendMessageW,NtdllDialogWndProc_W,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,SetCapture,ClientToScreen,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,2_2_0047C81C
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0047C81C SendMessageW,NtdllDialogWndProc_W,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,SetCapture,ClientToScreen,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,4_2_0047C81C

            System Summary

            barindex
            Source: 9.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 9.3.svchost.exe.345cf20.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.3.svchost.exe.345cf20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.3.svchost.exe.345cf20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.3.svchost.exe.345cf20.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.3.svchost.exe.345cf20.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.3.svchost.exe.345cf20.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.3.svchost.exe.2a5ff20.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.3.svchost.exe.2a5ff20.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.3.svchost.exe.2a5ff20.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.svchost.exe.7f40000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.7f40000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.7f40000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.3.svchost.exe.345c000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.3.svchost.exe.345c000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.3.svchost.exe.345c000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.5b8df90.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.5b8df90.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.5b8df90.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.71b0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.71b0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.71b0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.svchost.exe.7b80000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.7b80000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.7b80000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.3.svchost.exe.2a5f000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.3.svchost.exe.2a5f000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.3.svchost.exe.2a5f000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.71b0f20.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.71b0f20.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.71b0f20.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.svchost.exe.7b80f20.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.7b80f20.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.7b80f20.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 7.2.Hegeleos.exe.2bf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 9.2.svchost.exe.7b80f20.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.7b80f20.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.7b80f20.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 2.2.Hegeleos.exe.3e20000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 9.2.svchost.exe.7b80000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.7b80000.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.7b80000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.71b0f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.71b0f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.71b0f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 4.2.Hegeleos.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 9.2.svchost.exe.7f40000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.7f40000.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.7f40000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.3.svchost.exe.2a5f000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.3.svchost.exe.2a5f000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.3.svchost.exe.2a5f000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.7470000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.7470000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.7470000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 5.2.svchost.exe.5b8df90.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.5b8df90.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.5b8df90.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.5b46490.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.5b46490.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.5b46490.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.svchost.exe.662df90.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.662df90.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.662df90.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.svchost.exe.65e5570.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.65e5570.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.65e5570.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.2b74f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.5b45570.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.2b74f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.5b45570.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.2b74f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.5b45570.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.71b0000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.71b0000.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.71b0000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.7470000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.7470000.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.7470000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 5.2.svchost.exe.5b45570.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.5b45570.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.5b45570.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.2.svchost.exe.5b46490.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.2.svchost.exe.5b46490.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.2.svchost.exe.5b46490.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.svchost.exe.65e6490.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.65e6490.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.65e6490.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 9.3.svchost.exe.345c000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.3.svchost.exe.345c000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.3.svchost.exe.345c000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.svchost.exe.65e5570.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.65e5570.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.65e5570.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 5.3.svchost.exe.2a5ff20.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 5.3.svchost.exe.2a5ff20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 5.3.svchost.exe.2a5ff20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.svchost.exe.65e6490.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.65e6490.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.65e6490.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 9.2.svchost.exe.662df90.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 9.2.svchost.exe.662df90.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.svchost.exe.662df90.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000009.00000002.1304494588.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000007.00000002.1219278739.0000000002BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000005.00000002.1241609998.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000002.00000002.1104839377.0000000003E20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000004.00000002.1124492692.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: svchost.exe PID: 4088, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: svchost.exe PID: 7152, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0046A07E PostMessageW,GetFocus,GetDlgCtrlID,PostMessageW,NtdllDialogWndProc_W,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,0_2_0046A07E
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004710F1 NtdllDialogWndProc_W,ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,0_2_004710F1
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0045034C GetParent,NtdllDialogWndProc_W,0_2_0045034C
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044036A NtdllDialogWndProc_W,0_2_0044036A
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00440306 NtdllDialogWndProc_W,0_2_00440306
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0047132F NtdllDialogWndProc_W,0_2_0047132F
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00440338 NtdllDialogWndProc_W,0_2_00440338
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0046A38E NtdllDialogWndProc_W,NtdllDialogWndProc_W,0_2_0046A38E
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0045039B GetParent,NtdllDialogWndProc_W,NtdllDialogWndProc_W,NtdllDialogWndProc_W,0_2_0045039B
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004404E8 GetSystemMetrics,MoveWindow,SendMessageW,InvalidateRect,SendMessageW,ShowWindow,NtdllDialogWndProc_W,0_2_004404E8
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044048E NtdllDialogWndProc_W,0_2_0044048E
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044786A NtdllDialogWndProc_W,0_2_0044786A
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0047C81C SendMessageW,NtdllDialogWndProc_W,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,SetCapture,ClientToScreen,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,0_2_0047C81C
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004478AC GetCursorPos,TrackPopupMenuEx,NtdllDialogWndProc_W,GetCursorPos,TrackPopupMenuEx,0_2_004478AC
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004479A0 GetClientRect,GetCursorPos,ScreenToClient,WindowFromPoint,NtdllDialogWndProc_W,0_2_004479A0
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004629B7 NtdllDialogWndProc_W,NtdllDialogWndProc_W,0_2_004629B7
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0047EA6F NtdllDialogWndProc_W,0_2_0047EA6F
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00447ABC SendMessageW,NtdllDialogWndProc_W,0_2_00447ABC
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00447B4E NtdllDialogWndProc_W,0_2_00447B4E
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00454CFC NtdllDialogWndProc_W,0_2_00454CFC
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00454D4A NtdllDialogWndProc_W,0_2_00454D4A
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0042FDA6 ClientToScreen,NtdllDialogWndProc_W,0_2_0042FDA6
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0042FE05 NtdllDialogWndProc_W,0_2_0042FE05
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00470E96 DragQueryPoint,SendMessageW,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,0_2_00470E96
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0046A07E PostMessageW,GetFocus,GetDlgCtrlID,PostMessageW,NtdllDialogWndProc_W,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,2_2_0046A07E
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004710F1 NtdllDialogWndProc_W,ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,2_2_004710F1
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0045034C GetParent,NtdllDialogWndProc_W,2_2_0045034C
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0044036A NtdllDialogWndProc_W,2_2_0044036A
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00440306 NtdllDialogWndProc_W,2_2_00440306
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0047132F NtdllDialogWndProc_W,2_2_0047132F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00440338 NtdllDialogWndProc_W,2_2_00440338
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0046A38E NtdllDialogWndProc_W,NtdllDialogWndProc_W,2_2_0046A38E
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0045039B GetParent,NtdllDialogWndProc_W,NtdllDialogWndProc_W,NtdllDialogWndProc_W,2_2_0045039B
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004404E8 GetSystemMetrics,MoveWindow,SendMessageW,InvalidateRect,SendMessageW,ShowWindow,NtdllDialogWndProc_W,2_2_004404E8
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0044048E NtdllDialogWndProc_W,2_2_0044048E
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0044786A NtdllDialogWndProc_W,2_2_0044786A
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0047C81C SendMessageW,NtdllDialogWndProc_W,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,SetCapture,ClientToScreen,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,2_2_0047C81C
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004478AC GetCursorPos,TrackPopupMenuEx,NtdllDialogWndProc_W,GetCursorPos,TrackPopupMenuEx,2_2_004478AC
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004479A0 GetClientRect,GetCursorPos,ScreenToClient,WindowFromPoint,NtdllDialogWndProc_W,2_2_004479A0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004629B7 NtdllDialogWndProc_W,NtdllDialogWndProc_W,2_2_004629B7
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0047EA6F NtdllDialogWndProc_W,2_2_0047EA6F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00447ABC SendMessageW,NtdllDialogWndProc_W,2_2_00447ABC
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00447B4E NtdllDialogWndProc_W,2_2_00447B4E
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00454CFC NtdllDialogWndProc_W,2_2_00454CFC
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00454D4A NtdllDialogWndProc_W,2_2_00454D4A
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0042FDA6 ClientToScreen,NtdllDialogWndProc_W,2_2_0042FDA6
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0042FE05 NtdllDialogWndProc_W,2_2_0042FE05
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00470E96 DragQueryPoint,SendMessageW,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,2_2_00470E96
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00401100 NtdllDefWindowProc_W,KillTimer,PostQuitMessage,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,4_2_00401100
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0046A07E PostMessageW,GetFocus,GetDlgCtrlID,PostMessageW,NtdllDialogWndProc_W,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,4_2_0046A07E
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004710F1 NtdllDialogWndProc_W,ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,4_2_004710F1
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0045034C GetParent,NtdllDialogWndProc_W,4_2_0045034C
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0044036A NtdllDialogWndProc_W,4_2_0044036A
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00440306 NtdllDialogWndProc_W,4_2_00440306
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0047132F NtdllDialogWndProc_W,4_2_0047132F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00440338 NtdllDialogWndProc_W,4_2_00440338
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0046A38E NtdllDialogWndProc_W,NtdllDialogWndProc_W,4_2_0046A38E
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0045039B GetParent,NtdllDialogWndProc_W,NtdllDialogWndProc_W,NtdllDialogWndProc_W,4_2_0045039B
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004404E8 GetSystemMetrics,MoveWindow,SendMessageW,InvalidateRect,SendMessageW,ShowWindow,NtdllDialogWndProc_W,4_2_004404E8
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0044048E NtdllDialogWndProc_W,4_2_0044048E
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0044786A NtdllDialogWndProc_W,4_2_0044786A
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0047C81C SendMessageW,NtdllDialogWndProc_W,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,SetCapture,ClientToScreen,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,4_2_0047C81C
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004478AC GetCursorPos,TrackPopupMenuEx,NtdllDialogWndProc_W,GetCursorPos,TrackPopupMenuEx,4_2_004478AC
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004479A0 GetClientRect,GetCursorPos,ScreenToClient,WindowFromPoint,NtdllDialogWndProc_W,4_2_004479A0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004629B7 NtdllDialogWndProc_W,NtdllDialogWndProc_W,4_2_004629B7
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0047EA6F NtdllDialogWndProc_W,4_2_0047EA6F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00447ABC SendMessageW,NtdllDialogWndProc_W,4_2_00447ABC
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00447B4E NtdllDialogWndProc_W,4_2_00447B4E
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00454CFC NtdllDialogWndProc_W,4_2_00454CFC
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00454D4A NtdllDialogWndProc_W,4_2_00454D4A
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0042FDA6 ClientToScreen,NtdllDialogWndProc_W,4_2_0042FDA6
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0042FE05 GetWindowLongW,NtdllDialogWndProc_W,4_2_0042FE05
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00470E96 DragQueryPoint,SendMessageW,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,4_2_00470E96
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,74C45590,CreateProcessAsUserW,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,0_2_00446313
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,2_2_004333BE
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,4_2_004333BE
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004096A00_2_004096A0
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0042200C0_2_0042200C
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004041700_2_00404170
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0041A2170_2_0041A217
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004122160_2_00412216
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0042435D0_2_0042435D
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004033C00_2_004033C0
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044F4300_2_0044F430
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004125E80_2_004125E8
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044663B0_2_0044663B
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004138010_2_00413801
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0042096F0_2_0042096F
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004129D00_2_004129D0
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004119E30_2_004119E3
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0041C9AE0_2_0041C9AE
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0047EA6F0_2_0047EA6F
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0040FA100_2_0040FA10
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044EB5F0_2_0044EB5F
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00423C810_2_00423C81
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00411E780_2_00411E78
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00442E0C0_2_00442E0C
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00420EC00_2_00420EC0
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044CF170_2_0044CF17
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00444FD20_2_00444FD2
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_02F436500_2_02F43650
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004096A02_2_004096A0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0042200C2_2_0042200C
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004041702_2_00404170
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0041A2172_2_0041A217
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004122162_2_00412216
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0042435D2_2_0042435D
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004033C02_2_004033C0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0044F4302_2_0044F430
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004125E82_2_004125E8
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0044663B2_2_0044663B
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004138012_2_00413801
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0042096F2_2_0042096F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004129D02_2_004129D0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004119E32_2_004119E3
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0041C9AE2_2_0041C9AE
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0047EA6F2_2_0047EA6F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0040FA102_2_0040FA10
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0044EB5F2_2_0044EB5F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00423C812_2_00423C81
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00411E782_2_00411E78
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00442E0C2_2_00442E0C
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00420EC02_2_00420EC0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0044CF172_2_0044CF17
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00444FD22_2_00444FD2
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_03E136502_2_03E13650
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004096A04_2_004096A0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0042200C4_2_0042200C
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004041704_2_00404170
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0041A2174_2_0041A217
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004122164_2_00412216
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0042435D4_2_0042435D
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004033C04_2_004033C0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0044F4304_2_0044F430
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004125E84_2_004125E8
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0044663B4_2_0044663B
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004138014_2_00413801
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0042096F4_2_0042096F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004129D04_2_004129D0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004119E34_2_004119E3
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0041C9AE4_2_0041C9AE
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0047EA6F4_2_0047EA6F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0040FA104_2_0040FA10
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0044EB5F4_2_0044EB5F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00423C814_2_00423C81
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00411E784_2_00411E78
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00442E0C4_2_00442E0C
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00420EC04_2_00420EC0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0044CF174_2_0044CF17
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00444FD24_2_00444FD2
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00C336504_2_00C33650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_00408C605_2_00408C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0040DC115_2_0040DC11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_00407C3F5_2_00407C3F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_00418CCC5_2_00418CCC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_00406CA05_2_00406CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_004028B05_2_004028B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0041A4BE5_2_0041A4BE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_004182445_2_00418244
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_004016505_2_00401650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_00402F205_2_00402F20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_004193C45_2_004193C4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_004187885_2_00418788
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_00402F895_2_00402F89
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_00402B905_2_00402B90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_004073A05_2_004073A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_045D43205_2_045D4320
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_045D2EF85_2_045D2EF8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_045DC9D85_2_045DC9D8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_045DC9C95_2_045DC9C9
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 7_2_02AC36507_2_02AC3650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00408C609_2_00408C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0040DC119_2_0040DC11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00407C3F9_2_00407C3F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00418CCC9_2_00418CCC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00406CA09_2_00406CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004028B09_2_004028B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0041A4BE9_2_0041A4BE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004182449_2_00418244
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004016509_2_00401650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00402F209_2_00402F20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004193C49_2_004193C4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004187889_2_00418788
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00402F899_2_00402F89
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00402B909_2_00402B90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004073A09_2_004073A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_07B043119_2_07B04311
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_07B02EF89_2_07B02EF8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_07B0C9D89_2_07B0C9D8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_07B0C9C99_2_07B0C9C9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0040D606 appears 48 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0040E1D8 appears 88 times
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: String function: 004115D7 appears 36 times
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: String function: 00416C70 appears 39 times
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: String function: 00445AE0 appears 65 times
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: String function: 0040E710 appears 44 times
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: String function: 00401B10 appears 50 times
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: String function: 00408F40 appears 38 times
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: String function: 004301F8 appears 36 times
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: String function: 004115D7 appears 72 times
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: String function: 00416C70 appears 78 times
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: String function: 004181F2 appears 42 times
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: String function: 00445AE0 appears 130 times
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: String function: 0041341F appears 36 times
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: String function: 00422240 appears 38 times
            Source: TR3lYZyOE3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 9.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 9.3.svchost.exe.345cf20.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.3.svchost.exe.345cf20.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.3.svchost.exe.345cf20.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.3.svchost.exe.345cf20.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.3.svchost.exe.345cf20.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.3.svchost.exe.345cf20.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.3.svchost.exe.2a5ff20.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.3.svchost.exe.2a5ff20.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.3.svchost.exe.2a5ff20.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.svchost.exe.7f40000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.7f40000.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.7f40000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.3.svchost.exe.345c000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.3.svchost.exe.345c000.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.3.svchost.exe.345c000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.5b8df90.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.5b8df90.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.5b8df90.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.71b0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.71b0000.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.71b0000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.svchost.exe.7b80000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.7b80000.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.7b80000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.3.svchost.exe.2a5f000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.3.svchost.exe.2a5f000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.3.svchost.exe.2a5f000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.71b0f20.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.71b0f20.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.71b0f20.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.svchost.exe.7b80f20.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.7b80f20.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.7b80f20.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 7.2.Hegeleos.exe.2bf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 9.2.svchost.exe.7b80f20.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.7b80f20.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.7b80f20.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 2.2.Hegeleos.exe.3e20000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 9.2.svchost.exe.7b80000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.7b80000.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.7b80000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.71b0f20.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.71b0f20.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.71b0f20.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 4.2.Hegeleos.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 9.2.svchost.exe.7f40000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.7f40000.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.7f40000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.3.svchost.exe.2a5f000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.3.svchost.exe.2a5f000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.3.svchost.exe.2a5f000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.7470000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.7470000.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.7470000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 5.2.svchost.exe.5b8df90.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.5b8df90.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.5b8df90.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.5b46490.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.5b46490.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.5b46490.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.svchost.exe.662df90.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.662df90.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.662df90.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.svchost.exe.65e5570.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.65e5570.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.65e5570.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.2b74f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.5b45570.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.2b74f2e.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.5b45570.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.2b74f2e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.5b45570.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.71b0000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.71b0000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.71b0000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.7470000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.7470000.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.7470000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 5.2.svchost.exe.5b45570.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.5b45570.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.5b45570.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.2.svchost.exe.5b46490.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.2.svchost.exe.5b46490.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.2.svchost.exe.5b46490.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.svchost.exe.65e6490.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.65e6490.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.65e6490.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 9.3.svchost.exe.345c000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.3.svchost.exe.345c000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.3.svchost.exe.345c000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.svchost.exe.65e5570.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.65e5570.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.65e5570.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 5.3.svchost.exe.2a5ff20.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 5.3.svchost.exe.2a5ff20.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 5.3.svchost.exe.2a5ff20.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.svchost.exe.65e6490.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.65e6490.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.65e6490.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 9.2.svchost.exe.662df90.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 9.2.svchost.exe.662df90.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 9.2.svchost.exe.662df90.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000009.00000002.1304494588.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000007.00000002.1219278739.0000000002BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000005.00000002.1241609998.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000002.00000002.1104839377.0000000003E20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000004.00000002.1124492692.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: svchost.exe PID: 4088, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: svchost.exe PID: 7152, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: TR3lYZyOE3.exeStatic PE information: Section: UPX1 ZLIB complexity 0.9920951973062382
            Source: Hegeleos.exe.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.9920951973062382
            Source: 5.2.svchost.exe.5b8df90.2.raw.unpack, -k.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.svchost.exe.5b8df90.2.raw.unpack, -cA-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.svchost.exe.5b8df90.2.raw.unpack, -cA-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, -k.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, -cA-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, -cA-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.svchost.exe.71b0f20.5.raw.unpack, -k.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.svchost.exe.71b0f20.5.raw.unpack, -cA-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.svchost.exe.71b0f20.5.raw.unpack, -cA-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.svchost.exe.7470000.7.raw.unpack, -k.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.svchost.exe.7470000.7.raw.unpack, -cA-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.svchost.exe.7470000.7.raw.unpack, -cA-.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@14/13@1/1
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,2_2_004333BE
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,2_2_00464EAE
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,4_2_004333BE
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,4_2_00464EAE
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeFile created: C:\Users\user\AppData\Local\bankruptureJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeMutant created: NULL
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeFile created: C:\Users\user\AppData\Local\Temp\aut3370.tmpJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbs"
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCommand line argument: -u0_2_0040D6B0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCommand line argument: -u2_2_0040D6B0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCommand line argument: -u4_2_0040D6B0
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: TR3lYZyOE3.exeVirustotal: Detection: 72%
            Source: TR3lYZyOE3.exeReversingLabs: Detection: 65%
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeFile read: C:\Users\user\Desktop\TR3lYZyOE3.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\TR3lYZyOE3.exe "C:\Users\user\Desktop\TR3lYZyOE3.exe"
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeProcess created: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe "C:\Users\user\Desktop\TR3lYZyOE3.exe"
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\TR3lYZyOE3.exe"
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess created: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe"
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe"
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe"
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe"
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeProcess created: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe "C:\Users\user\Desktop\TR3lYZyOE3.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\TR3lYZyOE3.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess created: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe" Jump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
            Source: C:\Windows\SysWOW64\svchost.exeAutomated click: OK
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb\??\C:\Windows\Fonts\staticcache.dat source: svchost.exe, 00000005.00000002.1242307413.0000000002A83000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdbC:\Windows\assembly\GAC_64 source: svchost.exe, 00000009.00000003.1274782575.00000000034EC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: _.pdb source: svchost.exe, 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: Hegeleos.exe, 00000002.00000003.1103230603.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000002.00000003.1102923247.0000000004000000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000004.00000003.1120950370.0000000003F00000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000004.00000003.1119985209.00000000040A0000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000007.00000003.1215461077.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000007.00000003.1218286961.0000000004070000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Hegeleos.exe, 00000002.00000003.1103230603.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000002.00000003.1102923247.0000000004000000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000004.00000003.1120950370.0000000003F00000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000004.00000003.1119985209.00000000040A0000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000007.00000003.1215461077.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp, Hegeleos.exe, 00000007.00000003.1218286961.0000000004070000.00000004.00001000.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: 5.2.svchost.exe.71b0000.6.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
            Source: 5.2.svchost.exe.5b45570.3.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
            Source: 5.3.svchost.exe.2a5f000.1.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00416CB5 push ecx; ret 2_2_00416CC8
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00416CB5 push ecx; ret 4_2_00416CC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0041C40C push cs; iretd 5_2_0041C4E2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_00423149 push eax; ret 5_2_00423179
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0041C50E push cs; iretd 5_2_0041C4E2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_004231C8 push eax; ret 5_2_00423179
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0040E21D push ecx; ret 5_2_0040E230
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0041C6BE push ebx; ret 5_2_0041C6BF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0041C40C push cs; iretd 9_2_0041C4E2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00423149 push eax; ret 9_2_00423179
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0041C50E push cs; iretd 9_2_0041C4E2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004231C8 push eax; ret 9_2_00423179
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0040E21D push ecx; ret 9_2_0040E230
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0041C6BE push ebx; ret 9_2_0041C6BF
            Source: initial sampleStatic PE information: section name: UPX0
            Source: initial sampleStatic PE information: section name: UPX1
            Source: initial sampleStatic PE information: section name: UPX0
            Source: initial sampleStatic PE information: section name: UPX1
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeFile created: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbsJump to dropped file
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbsJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hegeleos.vbsJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_0047A330
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_00434418
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,4_2_0047A330
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,4_2_00434418
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeAPI/Special instruction interceptor: Address: 3E13274
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeAPI/Special instruction interceptor: Address: C33274
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeAPI/Special instruction interceptor: Address: 2AC3274
            Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 45D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 4B40000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 6B40000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 55E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 55E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 75E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,5_2_004019F0
            Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87613
            Source: C:\Windows\SysWOW64\svchost.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
            Source: C:\Windows\SysWOW64\svchost.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeAPI coverage: 4.2 %
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeAPI coverage: 4.5 %
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeAPI coverage: 4.1 %
            Source: C:\Windows\SysWOW64\svchost.exe TID: 3720Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exe TID: 2844Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exe TID: 7012Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exe TID: 6992Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,2_2_004339B6
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00452492
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00442886
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_004788BD
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,2_2_0045CAFA
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00431A86
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,2_2_0044BD27
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0045DE8F FindFirstFileW,FindClose,2_2_0045DE8F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0044BF8B
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,4_2_004339B6
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,4_2_00452492
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_00442886
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,4_2_004788BD
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,4_2_0045CAFA
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_00431A86
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,4_2_0044BD27
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0045DE8F FindFirstFileW,FindClose,4_2_0045DE8F
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,4_2_0044BF8B
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
            Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
            Source: svchost.exe, 00000009.00000002.1305267009.00000000034EE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1274782575.00000000034EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: wscript.exe, 00000006.00000002.1192964286.000001B2961A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{5d-
            Source: svchost.exe, 00000009.00000002.1304979352.0000000003454000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlltes>
            Source: Hegeleos.exe, 00000002.00000002.1104558386.0000000000A8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: svchost.exe, 00000005.00000002.1242214951.0000000002A54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllD#
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeAPI call chain: ExitProcess graph end nodegraph_0-86720
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,5_2_004019F0
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_02F434E0 mov eax, dword ptr fs:[00000030h]0_2_02F434E0
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_02F43540 mov eax, dword ptr fs:[00000030h]0_2_02F43540
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_02F41EA0 mov eax, dword ptr fs:[00000030h]0_2_02F41EA0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_03E13540 mov eax, dword ptr fs:[00000030h]2_2_03E13540
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_03E134E0 mov eax, dword ptr fs:[00000030h]2_2_03E134E0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_03E11EA0 mov eax, dword ptr fs:[00000030h]2_2_03E11EA0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00C334E0 mov eax, dword ptr fs:[00000030h]4_2_00C334E0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00C33540 mov eax, dword ptr fs:[00000030h]4_2_00C33540
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00C31EA0 mov eax, dword ptr fs:[00000030h]4_2_00C31EA0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 7_2_02AC1EA0 mov eax, dword ptr fs:[00000030h]7_2_02AC1EA0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 7_2_02AC34E0 mov eax, dword ptr fs:[00000030h]7_2_02AC34E0
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 7_2_02AC3540 mov eax, dword ptr fs:[00000030h]7_2_02AC3540
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,RtlAllocateHeap,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
            Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0041F250 SetUnhandledExceptionFilter,2_2_0041F250
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0041A208
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00417DAA
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0041F250 SetUnhandledExceptionFilter,4_2_0041F250
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0041A208
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00417DAA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0040CE09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0040E61C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00416F6A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_004123F1 SetUnhandledExceptionFilter,5_2_004123F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_0040CE09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_0040E61C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00416F6A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004123F1 SetUnhandledExceptionFilter,9_2_004123F1
            Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 158.101.44.242 80Jump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2675008Jump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F6C008Jump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\TR3lYZyOE3.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe"Jump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\bankrupture\Hegeleos.exe" Jump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
            Source: Hegeleos.exeBinary or memory string: Shell_TrayWnd
            Source: TR3lYZyOE3.exe, 00000000.00000002.1081177403.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Hegeleos.exe, 00000002.00000002.1103958009.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Hegeleos.exe, 00000004.00000002.1122684661.0000000000401000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
            Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,5_2_00417A20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,9_2_00417A20
            Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000009.00000002.1306003093.00000000055E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1243237842.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 9.3.svchost.exe.345cf20.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345cf20.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5ff20.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7f40000.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345c000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b8df90.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5f000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0f20.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80f20.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80f20.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0f20.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7f40000.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5f000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.7470000.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b8df90.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b46490.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.662df90.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e5570.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b45570.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.2b74f2e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.7470000.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b45570.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b46490.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e6490.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345c000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e5570.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5ff20.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e6490.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.662df90.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4088, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7152, type: MEMORYSTR
            Source: Yara matchFile source: 9.3.svchost.exe.345cf20.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345cf20.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5ff20.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7f40000.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345c000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b8df90.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5f000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0f20.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80f20.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80f20.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0f20.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7f40000.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5f000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.7470000.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b8df90.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b46490.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.662df90.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e5570.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b45570.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.2b74f2e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.7470000.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b45570.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b46490.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e6490.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345c000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e5570.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5ff20.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e6490.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.662df90.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4088, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7152, type: MEMORYSTR
            Source: Hegeleos.exeBinary or memory string: WIN_XP
            Source: Hegeleos.exe, 00000007.00000002.1218729972.0000000000401000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
            Source: Hegeleos.exeBinary or memory string: WIN_XPe
            Source: Hegeleos.exeBinary or memory string: WIN_VISTA
            Source: Hegeleos.exeBinary or memory string: WIN_7
            Source: Hegeleos.exeBinary or memory string: WIN_8
            Source: Yara matchFile source: 9.3.svchost.exe.345cf20.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345cf20.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5ff20.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7f40000.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345c000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b8df90.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5f000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0f20.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80f20.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80f20.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0f20.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7f40000.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5f000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.7470000.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b8df90.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b46490.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.662df90.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e5570.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b45570.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.2b74f2e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.7470000.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b45570.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b46490.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e6490.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345c000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e5570.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5ff20.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e6490.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.662df90.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4088, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7152, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000009.00000002.1306003093.00000000055E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1243237842.0000000004B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 9.3.svchost.exe.345cf20.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345cf20.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5ff20.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7f40000.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345c000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b8df90.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5f000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0f20.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80f20.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80f20.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0f20.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7f40000.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5f000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.7470000.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b8df90.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b46490.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.662df90.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e5570.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b45570.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.2b74f2e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.7470000.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b45570.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b46490.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e6490.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345c000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e5570.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5ff20.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e6490.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.662df90.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4088, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7152, type: MEMORYSTR
            Source: Yara matchFile source: 9.3.svchost.exe.345cf20.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.2b74f2e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345cf20.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5ff20.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7f40000.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345c000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.3574f2e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b8df90.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5f000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0f20.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80f20.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80f20.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7b80000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0f20.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.7f40000.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5f000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.7470000.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b8df90.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b46490.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.662df90.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e5570.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b45570.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.2b74f2e.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.71b0000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.7470000.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b45570.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.svchost.exe.5b46490.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e6490.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.3.svchost.exe.345c000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.3574f2e.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e5570.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.3.svchost.exe.2a5ff20.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.65e6490.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.svchost.exe.662df90.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000009.00000002.1306752473.0000000007B80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000003.1219174380.000000000345C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1243397567.0000000005B45000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1305315065.0000000003574000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1123909091.0000000002A5F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1243612016.00000000071B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1307281485.0000000007F40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1242545788.0000000002B74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1244057705.0000000007470000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1306220026.00000000065E5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4088, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7152, type: MEMORYSTR
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
            Source: C:\Users\user\Desktop\TR3lYZyOE3.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,2_2_004652BE
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_00476619
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 2_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,2_2_0046CEF3
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,4_2_004652BE
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,4_2_00476619
            Source: C:\Users\user\AppData\Local\bankrupture\Hegeleos.exeCode function: 4_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,4_2_0046CEF3
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information111
            Scripting
            2
            Valid Accounts
            3
            Native API
            111
            Scripting
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            21
            Input Capture
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop Protocol21
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt2
            Valid Accounts
            2
            Valid Accounts
            21
            Obfuscated Files or Information
            Security Account Manager3
            File and Directory Discovery
            SMB/Windows Admin Shares3
            Clipboard Data
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron2
            Registry Run Keys / Startup Folder
            21
            Access Token Manipulation
            111
            Software Packing
            NTDS126
            System Information Discovery
            Distributed Component Object ModelInput Capture12
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script312
            Process Injection
            1
            DLL Side-Loading
            LSA Secrets231
            Security Software Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
            Registry Run Keys / Startup Folder
            1
            Masquerading
            Cached Domain Credentials31
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Valid Accounts
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
            Virtualization/Sandbox Evasion
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
            Access Token Manipulation
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron312
            Process Injection
            Network Sniffing1
            System Network Configuration Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1631793 Sample: TR3lYZyOE3.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 35 checkip.dyndns.org 2->35 37 checkip.dyndns.com 2->37 53 Found malware configuration 2->53 55 Malicious sample detected (through community Yara rule) 2->55 57 Antivirus / Scanner detection for submitted sample 2->57 59 9 other signatures 2->59 9 TR3lYZyOE3.exe 6 2->9         started        12 wscript.exe 1 2->12         started        signatures3 process4 file5 31 C:\Users\user\AppData\Local\...\Hegeleos.exe, PE32 9->31 dropped 15 Hegeleos.exe 3 9->15         started        67 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->67 19 Hegeleos.exe 2 12->19         started        signatures6 process7 file8 33 C:\Users\user\AppData\...\Hegeleos.vbs, data 15->33 dropped 41 Antivirus detection for dropped file 15->41 43 Multi AV Scanner detection for dropped file 15->43 45 Drops VBS files to the startup folder 15->45 47 Switches to a custom stack to bypass stack traces 15->47 21 Hegeleos.exe 2 15->21         started        24 svchost.exe 15->24         started        49 Writes to foreign memory regions 19->49 51 Maps a DLL or memory area into another process 19->51 26 svchost.exe 2 19->26         started        signatures9 process10 signatures11 61 Writes to foreign memory regions 21->61 63 Maps a DLL or memory area into another process 21->63 28 svchost.exe 15 3 21->28         started        65 System process connects to network (likely due to code injection or exploit) 26->65 process12 dnsIp13 39 checkip.dyndns.com 158.101.44.242, 49698, 49701, 80 ORACLE-BMC-31898US United States 28->39

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.