Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment slip.exe

Overview

General Information

Sample name:Payment slip.exe
Analysis ID:1638158
MD5:17669e24a399028c85b83b759a06f785
SHA1:d153f832f3f531d35782cfa47456b4d3b4ae1e6a
SHA256:f044b5d05d7ba6db1b4145a880af916645f2c3e1c28341cee79021ffedb4d1a9
Tags:exeuser-julianmckein
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
.NET source code contains potential unpacker
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Sample uses string decryption to hide its real strings
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Payment slip.exe (PID: 7528 cmdline: "C:\Users\user\Desktop\Payment slip.exe" MD5: 17669E24A399028C85B83B759A06F785)
    • Payment slip.exe (PID: 7692 cmdline: "C:\Users\user\Desktop\Payment slip.exe" MD5: 17669E24A399028C85B83B759A06F785)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot8001882214:AAFYbuE3sctUsMptRg6i8B28zD_AOK7mrvg/sendMessage?chat_id=6090860697", "Token": "8001882214:AAFYbuE3sctUsMptRg6i8B28zD_AOK7mrvg", "Chat_id": "6090860697", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x148e0:$a1: get_encryptedPassword
      • 0x14bcc:$a2: get_encryptedUsername
      • 0x146ec:$a3: get_timePasswordChanged
      • 0x147e7:$a4: get_passwordField
      • 0x148f6:$a5: set_encryptedPassword
      • 0x15f4c:$a7: get_logins
      • 0x15eaf:$a10: KeyLoggerEventArgs
      • 0x15b1a:$a11: KeyLoggerEventArgsEventHandler
      00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x198c4:$x1: $%SMTPDV$
      • 0x182a8:$x2: $#TheHashHere%&
      • 0x1986c:$x3: %FTPDV$
      • 0x18248:$x4: $%TelegramDv$
      • 0x15b1a:$x5: KeyLoggerEventArgs
      • 0x15eaf:$x5: KeyLoggerEventArgs
      • 0x19890:$m2: Clipboard Logs ID
      • 0x19ace:$m2: Screenshot Logs ID
      • 0x19bde:$m2: keystroke Logs ID
      • 0x19eb8:$m3: SnakePW
      • 0x19aa6:$m4: \SnakeKeylogger\
      00000003.00000002.3660519204.000000000328F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        1.2.Payment slip.exe.443a310.5.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          1.2.Payment slip.exe.443a310.5.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            1.2.Payment slip.exe.443a310.5.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x12ce0:$a1: get_encryptedPassword
            • 0x12fcc:$a2: get_encryptedUsername
            • 0x12aec:$a3: get_timePasswordChanged
            • 0x12be7:$a4: get_passwordField
            • 0x12cf6:$a5: set_encryptedPassword
            • 0x1434c:$a7: get_logins
            • 0x142af:$a10: KeyLoggerEventArgs
            • 0x13f1a:$a11: KeyLoggerEventArgsEventHandler
            1.2.Payment slip.exe.443a310.5.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1a67a:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x198ac:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x19cdf:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1ad1e:$a5: \Kometa\User Data\Default\Login Data
            1.2.Payment slip.exe.443a310.5.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x138a9:$s1: UnHook
            • 0x138b0:$s2: SetHook
            • 0x138b8:$s3: CallNextHook
            • 0x138c5:$s4: _hook
            Click to see the 24 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-14T09:10:19.967927+010028033053Unknown Traffic192.168.2.649697104.21.16.1443TCP
            2025-03-14T09:10:23.085162+010028033053Unknown Traffic192.168.2.649699104.21.16.1443TCP
            2025-03-14T09:10:31.005709+010028033053Unknown Traffic192.168.2.649707104.21.16.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-14T09:10:14.557237+010028032742Potentially Bad Traffic192.168.2.649692193.122.6.16880TCP
            2025-03-14T09:10:18.104231+010028032742Potentially Bad Traffic192.168.2.649692193.122.6.16880TCP
            2025-03-14T09:10:20.651096+010028032742Potentially Bad Traffic192.168.2.649698193.122.6.16880TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Payment slip.exeAvira: detected
            Source: 00000003.00000002.3660519204.00000000030C1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot8001882214:AAFYbuE3sctUsMptRg6i8B28zD_AOK7mrvg/sendMessage?chat_id=6090860697", "Token": "8001882214:AAFYbuE3sctUsMptRg6i8B28zD_AOK7mrvg", "Chat_id": "6090860697", "Version": "5.1"}
            Source: Payment slip.exeVirustotal: Detection: 43%Perma Link
            Source: Payment slip.exeReversingLabs: Detection: 60%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 1.2.Payment slip.exe.443a310.5.unpackString decryptor:
            Source: 1.2.Payment slip.exe.443a310.5.unpackString decryptor: 8001882214:AAFYbuE3sctUsMptRg6i8B28zD_AOK7mrvg
            Source: 1.2.Payment slip.exe.443a310.5.unpackString decryptor: 6090860697

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Payment slip.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.6:49696 version: TLS 1.0
            Source: Payment slip.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 0145F1F6h3_2_0145F007
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 0145FB80h3_2_0145F007
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_0145E528
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_0145EB5B
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_0145ED3C
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D08945h3_2_06D08608
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D00FF1h3_2_06D00D48
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D06171h3_2_06D05EC8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06D036CE
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D05D19h3_2_06D05A70
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D058C1h3_2_06D05618
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D06E79h3_2_06D06BD0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06D033B8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06D033A8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D06A21h3_2_06D06778
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D065C9h3_2_06D06320
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D00B99h3_2_06D008F0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D00741h3_2_06D00498
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D07751h3_2_06D074A8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D072FAh3_2_06D07050
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D002E9h3_2_06D00040
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D05441h3_2_06D05198
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D08459h3_2_06D081B0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D08001h3_2_06D07D58
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 4x nop then jmp 06D07BA9h3_2_06D07900
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
            Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
            Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49692 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49698 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49707 -> 104.21.16.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49699 -> 104.21.16.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49697 -> 104.21.16.1:443
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.6:49696 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: Payment slip.exe, 00000003.00000002.3660519204.0000000003237000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003245000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003273000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003229000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003189000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000321C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: Payment slip.exe, 00000003.00000002.3660519204.0000000003237000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000317D000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003245000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003253000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003273000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003229000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003189000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000321C000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.00000000031CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: Payment slip.exe, 00000003.00000002.3660519204.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: Payment slip.exe, 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: Payment slip.exe, 00000003.00000002.3660519204.0000000003237000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003245000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003273000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003229000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000321C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: Payment slip.exe, 00000003.00000002.3660519204.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Payment slip.exe, 00000003.00000002.3660519204.0000000003237000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003245000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003273000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003229000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003189000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000321C000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.00000000031CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: Payment slip.exe, 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003189000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: Payment slip.exe, 00000003.00000002.3660519204.00000000031CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: Payment slip.exe, 00000003.00000002.3660519204.0000000003237000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003245000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003273000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003229000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000321C000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.00000000031CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702

            System Summary

            barindex
            Source: 1.2.Payment slip.exe.443a310.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.Payment slip.exe.443a310.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.Payment slip.exe.443a310.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.Payment slip.exe.443a310.5.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.Payment slip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.Payment slip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.Payment slip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.Payment slip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 1.2.Payment slip.exe.443a310.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.Payment slip.exe.443a310.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.Payment slip.exe.443a310.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.Payment slip.exe.443a310.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: Payment slip.exe PID: 7528, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: Payment slip.exe PID: 7528, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: Payment slip.exe PID: 7692, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: Payment slip.exe PID: 7692, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: initial sampleStatic PE information: Filename: Payment slip.exe
            Source: C:\Users\user\Desktop\Payment slip.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E26791_2_027E2679
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E08721_2_027E0872
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E96E81_2_027E96E8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E14081_2_027E1408
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E35401_2_027E3540
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E1C801_2_027E1C80
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E13581_2_027E1358
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E13B31_2_027E13B3
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E56981_2_027E5698
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E56881_2_027E5688
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E35171_2_027E3517
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E5B501_2_027E5B50
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E5B401_2_027E5B40
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E58F01_2_027E58F0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_027E58E01_2_027E58E0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_04DE97D01_2_04DE97D0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_04DE8DC41_2_04DE8DC4
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_04DE5CCC1_2_04DE5CCC
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_04DE7C781_2_04DE7C78
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_04DE7C681_2_04DE7C68
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_04DE9C131_2_04DE9C13
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_04DE9C301_2_04DE9C30
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_04DE8DC11_2_04DE8DC1
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_04DE8D281_2_04DE8D28
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_04DE8E141_2_04DE8E14
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_093300401_2_09330040
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_09333A301_2_09333A30
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 1_2_093345F01_2_093345F0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_014561083_2_01456108
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_0145C1903_2_0145C190
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_0145F0073_2_0145F007
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_0145B3283_2_0145B328
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_0145C4703_2_0145C470
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_0145C7513_2_0145C751
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_014598583_2_01459858
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_014568803_2_01456880
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_0145BBD23_2_0145BBD2
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_0145CA313_2_0145CA31
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_01454AD93_2_01454AD9
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_0145BEB03_2_0145BEB0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_014535703_2_01453570
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_0145E5173_2_0145E517
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_0145E5283_2_0145E528
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_0145B4F23_2_0145B4F2
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0B6E83_2_06D0B6E8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0AA583_2_06D0AA58
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0D6703_2_06D0D670
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D086083_2_06D08608
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0C3883_2_06D0C388
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0B0A03_2_06D0B0A0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D08C513_2_06D08C51
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0A4083_2_06D0A408
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0D0283_2_06D0D028
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0C9D83_2_06D0C9D8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D011A03_2_06D011A0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D00D483_2_06D00D48
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0BD383_2_06D0BD38
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0B6D93_2_06D0B6D9
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D05EC83_2_06D05EC8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D05EB83_2_06D05EB8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0AA483_2_06D0AA48
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D05A703_2_06D05A70
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D05A603_2_06D05A60
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0D6613_2_06D0D661
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D056183_2_06D05618
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0560A3_2_06D0560A
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D06BD03_2_06D06BD0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D06BC13_2_06D06BC1
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0A3F83_2_06D0A3F8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D033B83_2_06D033B8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D033A83_2_06D033A8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D067783_2_06D06778
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0C3783_2_06D0C378
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0676A3_2_06D0676A
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D063123_2_06D06312
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D037303_2_06D03730
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D063203_2_06D06320
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D008F03_2_06D008F0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D078F03_2_06D078F0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D008E03_2_06D008E0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D074973_2_06D07497
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D004983_2_06D00498
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D004883_2_06D00488
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0B08F3_2_06D0B08F
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D074A83_2_06D074A8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D070503_2_06D07050
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D000403_2_06D00040
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D070403_2_06D07040
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D028183_2_06D02818
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0D0183_2_06D0D018
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D000073_2_06D00007
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D028073_2_06D02807
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D044303_2_06D04430
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D044203_2_06D04420
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0C9C83_2_06D0C9C8
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D085FC3_2_06D085FC
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D011913_2_06D01191
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D051983_2_06D05198
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0518A3_2_06D0518A
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D081B03_2_06D081B0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D081A03_2_06D081A0
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D07D583_2_06D07D58
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D07D483_2_06D07D48
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D079003_2_06D07900
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D00D393_2_06D00D39
            Source: C:\Users\user\Desktop\Payment slip.exeCode function: 3_2_06D0BD283_2_06D0BD28
            Source: Payment slip.exe, 00000001.00000002.1213019614.0000000000ACE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Payment slip.exe
            Source: Payment slip.exe, 00000001.00000000.1202335513.000000000057A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamenEUG.exe8 vs Payment slip.exe
            Source: Payment slip.exe, 00000001.00000002.1221091944.00000000092C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Payment slip.exe
            Source: Payment slip.exe, 00000001.00000002.1215142486.0000000002A06000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Payment slip.exe
            Source: Payment slip.exe, 00000001.00000002.1220826436.0000000007830000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Payment slip.exe
            Source: Payment slip.exe, 00000001.00000002.1215142486.00000000029C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Payment slip.exe
            Source: Payment slip.exe, 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Payment slip.exe
            Source: Payment slip.exe, 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Payment slip.exe
            Source: Payment slip.exe, 00000001.00000002.1215142486.0000000002DB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Payment slip.exe
            Source: Payment slip.exe, 00000001.00000002.1215142486.0000000002BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Payment slip.exe
            Source: Payment slip.exe, 00000001.00000002.1215142486.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Payment slip.exe
            Source: Payment slip.exe, 00000003.00000002.3658499964.00000000010F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Payment slip.exe
            Source: Payment slip.exe, 00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Payment slip.exe
            Source: Payment slip.exeBinary or memory string: OriginalFilenamenEUG.exe8 vs Payment slip.exe
            Source: Payment slip.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 1.2.Payment slip.exe.443a310.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.Payment slip.exe.443a310.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.Payment slip.exe.443a310.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.Payment slip.exe.443a310.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.Payment slip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.Payment slip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.Payment slip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.Payment slip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 1.2.Payment slip.exe.443a310.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.Payment slip.exe.443a310.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.Payment slip.exe.443a310.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.Payment slip.exe.443a310.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: Payment slip.exe PID: 7528, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: Payment slip.exe PID: 7528, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: Payment slip.exe PID: 7692, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: Payment slip.exe PID: 7692, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Payment slip.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 1.2.Payment slip.exe.443a310.5.raw.unpack, --j-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.Payment slip.exe.443a310.5.raw.unpack, --j-.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.Payment slip.exe.443a310.5.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.Payment slip.exe.443a310.5.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, ryyrd0rJBWMktoNnBP.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, ryyrd0rJBWMktoNnBP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, fvcsapb9hyjct1cgyo.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, fvcsapb9hyjct1cgyo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, fvcsapb9hyjct1cgyo.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, fvcsapb9hyjct1cgyo.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, fvcsapb9hyjct1cgyo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, fvcsapb9hyjct1cgyo.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, fvcsapb9hyjct1cgyo.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, fvcsapb9hyjct1cgyo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, fvcsapb9hyjct1cgyo.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, ryyrd0rJBWMktoNnBP.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, ryyrd0rJBWMktoNnBP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, ryyrd0rJBWMktoNnBP.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, ryyrd0rJBWMktoNnBP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
            Source: C:\Users\user\Desktop\Payment slip.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment slip.exe.logJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMutant created: NULL
            Source: Payment slip.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: Payment slip.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\Payment slip.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Payment slip.exe, 00000003.00000002.3662412052.0000000004150000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003343000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003350000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.00000000032FE000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000331C000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000330D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Payment slip.exeVirustotal: Detection: 43%
            Source: Payment slip.exeReversingLabs: Detection: 60%
            Source: unknownProcess created: C:\Users\user\Desktop\Payment slip.exe "C:\Users\user\Desktop\Payment slip.exe"
            Source: C:\Users\user\Desktop\Payment slip.exeProcess created: C:\Users\user\Desktop\Payment slip.exe "C:\Users\user\Desktop\Payment slip.exe"
            Source: C:\Users\user\Desktop\Payment slip.exeProcess created: C:\Users\user\Desktop\Payment slip.exe "C:\Users\user\Desktop\Payment slip.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: iconcodecservice.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Payment slip.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Payment slip.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, fvcsapb9hyjct1cgyo.cs.Net Code: vh5pyeA7QG System.Reflection.Assembly.Load(byte[])
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, fvcsapb9hyjct1cgyo.cs.Net Code: vh5pyeA7QG System.Reflection.Assembly.Load(byte[])
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, fvcsapb9hyjct1cgyo.cs.Net Code: vh5pyeA7QG System.Reflection.Assembly.Load(byte[])
            Source: Payment slip.exeStatic PE information: section name: .text entropy: 7.746606671423707
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, hyU2kP523bNQjHxmN6.csHigh entropy of concatenated method names: 'qypZr4Wdex', 'MVAZKnVsuL', 'H1XZoCdS8A', 'yobZl6CgOn', 'fqaZVEFD8a', 'hUoZgvTjmD', 'jgBZQ87q4Q', 'cniZ7gGIZR', 'We8ZtdFLMZ', 'rKSZvxQape'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, GlYTWZQchbpgpPIbhn.csHigh entropy of concatenated method names: 'iqZxWEmT50', 'LP3xcnU3yJ', 'gcExTG74hE', 'IhmT6QWfmt', 'bRWTz3feKY', 'TdDxCr0f3L', 'gYfxFpG8TZ', 'sBYxRyRfjH', 'S41xmHfjgW', 'I3Pxp5epBG'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, gPtxAqz3n1yngklp8s.csHigh entropy of concatenated method names: 'i0TUhFrR3C', 'VOZUrXXMAY', 'LwGUKFwUTA', 'U1kUoX7Mxp', 'GqBUlApgHx', 'hrSUVVn5yD', 'Ek4UgeyFuj', 'J4WUGlrCXE', 'QrgUquswYN', 'cTDUNismqh'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, jOhEAcjYMhnccghhMt.csHigh entropy of concatenated method names: 'ToString', 'JbMnvgCS85', 'YmknlpMHNj', 'EE8nd9DP6o', 'jEknVKsqvp', 'SX1ngr9Cxc', 'CiLn32C35y', 'K47nQiDCfn', 'aepn7wgRdI', 'M3inLtL8ir'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, Jkq2AORLRPsL0TItgA.csHigh entropy of concatenated method names: 'sGdyYUZXU', 'Hd4IMkrY4', 'bIXh0Rnq5', 'wZyHiOyoS', 'dOYK8Bi5b', 'iKh9gxGta', 'j088oTBldIdVN4XKsk', 'pMKbRycMjHYxRsdu2K', 'lx8OjR80H', 'baIUBHVlM'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, gvETgFFCQkiO5ZwjOd5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'N1tUvunN1r', 'N0WUMuATb8', 'pxUU55dGnP', 'yLKUfrGm3A', 'wYqUDPCiga', 'js0UjS5tZE', 'oUGUY0OCU8'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, QlAkGk67J1gBMEr0ut.csHigh entropy of concatenated method names: 'P59UcnjjyT', 'VhiU8V0tAJ', 'LIGUTywo1P', 'wahUxCA2Yv', 'JliUSNJFLM', 'TYhUb0OIje', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, CxjneHwxXsp7xkV5oM.csHigh entropy of concatenated method names: 'RYCS2HJGm8', 'CEcSi8p9ke', 'KTSSSZCedB', 'kY6S0fTkl3', 'ymnSEmTgHB', 'GHaSGEc8GQ', 'Dispose', 'jsyOWF1lvE', 'JxnOBa8Kq4', 'TynOcqQQ7T'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, Sx5rcdBKVAU4JT8ri0.csHigh entropy of concatenated method names: 'Dispose', 'Xp7FsxkV5o', 'mp5RloEtRk', 'RrY9offf6b', 'PrTF6CgeeP', 'DQNFzATcI0', 'ProcessDialogKey', 'xC2RCHwpPb', 'UiVRFCNyJ6', 'mZ9RR5lAkG'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, fvcsapb9hyjct1cgyo.csHigh entropy of concatenated method names: 'QYhmesgHix', 'D5smWPvDGk', 'OT2mBxvGI6', 'y8HmcstmqH', 'MKem82svJh', 'h2CmTKPYsL', 'goPmxfSrFJ', 'NAambQFR3s', 'UwPm48aZEJ', 'gEdmuG15eW'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, zeUtarV29xKxSitwgc.csHigh entropy of concatenated method names: 'zjUTGUtJXR', 'oW8Tq1jU3H', 'O2LTyByxec', 'MFSTIyOs1H', 'QxHThloJxZ', 'dn3THbbthU', 'IoPTKMSudw', 'f2yT9EH0Fo', 'zO2UrpRQtd7ssEaXakJ', 'Q6nqmmRH1rM9NuBGxQL'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, oHwpPbs1iVCNyJ6uZ9.csHigh entropy of concatenated method names: 'UgdSouJEws', 'jlNSlrKHns', 'rLtSdQTeWZ', 'QN3SVeIkn9', 'xt8SgUMYrk', 'aXoS3cU7Ty', 'rk8SQbmIgl', 'XlsS7sUU15', 'tKtSLrYjtU', 'OxLStDhEUr'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, VgGwDRfamFL6HnBMNM.csHigh entropy of concatenated method names: 'g6F2tVOkY4', 'B5M2MikWvh', 'txc2f9RAc8', 'xcU2DHwNYE', 'A662lm5RGf', 'Pp22dFt2LK', 'Bly2VHbUXt', 'gw82gowfUb', 'xHS23WmGms', 'mNt2QHj5CC'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, njX1TCKuYL6WcKUIDt.csHigh entropy of concatenated method names: 'vqIcIpdOcq', 'QyUchOKMsp', 'btTcrV1l3q', 'MDdcKXLeym', 'QT4c2XYRTB', 'DmYcnaFE0s', 'NfDcijoLeR', 'CJwcORBieB', 'iT2cSWCjfi', 'xsQcUYZkHj'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, GyW1pDFFymGCoeB5JPM.csHigh entropy of concatenated method names: 'gOLU68Tl5J', 'R6sUzhxRBG', 'W8i0CdYNAA', 'EFG0Fviv8V', 'QXX0R1TZZq', 'hC40mRIfu1', 'RJm0p1qOMh', 'gNx0enFu42', 'qaw0WdZVnb', 'KNZ0B0PZML'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, oTA4uZpBAR1Pn34sBj.csHigh entropy of concatenated method names: 'geOFxyyrd0', 'BBWFbMktoN', 'auYFuL6WcK', 'sIDFPtZcT9', 'pVUF2dx6Nq', 'DAqFnTa7Bc', 'RFZ9gmpXXf55S1Y19C', 'kiP3GNSIaWhtPUSa1T', 'psWFFXrjiN', 'ABgFmduXXv'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, iQjCGbLUgw19tJBgj8.csHigh entropy of concatenated method names: 'WKjxqekFvp', 'dssxNZ7WNa', 'sWQxyNLxIb', 'Gi3xIFEI7C', 'jRGxJ4CYwf', 'hh0xhfOgBk', 'AOExHTvADV', 'KvYxrnmAVM', 'qU7xKbcg0Y', 'H2nx9coTks'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, myoh9T1g26PdSlUSh9.csHigh entropy of concatenated method names: 'imoiaVU9ZC', 'AWni6VZHI7', 'yANOCnT2DK', 'IhMOFThWsR', 'AF4iv1mvQF', 'CogiMkx15g', 'Aqki5pQMl3', 'CJnifU7XY6', 'PkXiDVrjhl', 'i2TijjkhLe'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, ryyrd0rJBWMktoNnBP.csHigh entropy of concatenated method names: 'Aj4BfVc00h', 'OmfBDHpYCG', 'vSkBjmBFcn', 'DryBYtPiLD', 'Bs9BkfWfwu', 'Qy7B18jLYE', 'dD7BwboNbq', 'C8eBaPrpeQ', 'QcPBsL6uPu', 'kHNB6WPh9y'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, eQRwdmlmvTm3xc050d.csHigh entropy of concatenated method names: 'No9rCdR50VYHsKOmwWL', 'Af5tIbRXniQJjYudUOD', 'pMITOFC6je', 'GcXTSnsgNp', 'SatTU9cCHo', 'E3ThXJRjJZkDPXUKg8i', 'DiNRpkRPCy0aFfLJp0a', 'UPa5CCRbkmgMj9Mjwhe'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, eH5TYZcHM2Fog2XlKb.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'F5CRsqY41J', 'VJoR6V79mv', 'ER0RzcccE4', 'TEsmC7QKOT', 'q9emFufngH', 'nPOmRrkUOp', 'JXtmmDIni0', 'gYF8JyEJ9uAIgHWL25v'
            Source: 1.2.Payment slip.exe.92c0000.9.raw.unpack, YNqHAqoTa7Bc1jXMj3.csHigh entropy of concatenated method names: 'G4NTe56W3G', 'yb3TBMHF3u', 'p2RT84X4ax', 'Y2sTxEuDSj', 'wnRTbmfbZH', 'zSQ8ktF9Vo', 'bml81qBijV', 'qt78wCGvsX', 'lvI8aIwKEW', 'CDo8sIcOee'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, hyU2kP523bNQjHxmN6.csHigh entropy of concatenated method names: 'qypZr4Wdex', 'MVAZKnVsuL', 'H1XZoCdS8A', 'yobZl6CgOn', 'fqaZVEFD8a', 'hUoZgvTjmD', 'jgBZQ87q4Q', 'cniZ7gGIZR', 'We8ZtdFLMZ', 'rKSZvxQape'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, GlYTWZQchbpgpPIbhn.csHigh entropy of concatenated method names: 'iqZxWEmT50', 'LP3xcnU3yJ', 'gcExTG74hE', 'IhmT6QWfmt', 'bRWTz3feKY', 'TdDxCr0f3L', 'gYfxFpG8TZ', 'sBYxRyRfjH', 'S41xmHfjgW', 'I3Pxp5epBG'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, gPtxAqz3n1yngklp8s.csHigh entropy of concatenated method names: 'i0TUhFrR3C', 'VOZUrXXMAY', 'LwGUKFwUTA', 'U1kUoX7Mxp', 'GqBUlApgHx', 'hrSUVVn5yD', 'Ek4UgeyFuj', 'J4WUGlrCXE', 'QrgUquswYN', 'cTDUNismqh'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, jOhEAcjYMhnccghhMt.csHigh entropy of concatenated method names: 'ToString', 'JbMnvgCS85', 'YmknlpMHNj', 'EE8nd9DP6o', 'jEknVKsqvp', 'SX1ngr9Cxc', 'CiLn32C35y', 'K47nQiDCfn', 'aepn7wgRdI', 'M3inLtL8ir'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, Jkq2AORLRPsL0TItgA.csHigh entropy of concatenated method names: 'sGdyYUZXU', 'Hd4IMkrY4', 'bIXh0Rnq5', 'wZyHiOyoS', 'dOYK8Bi5b', 'iKh9gxGta', 'j088oTBldIdVN4XKsk', 'pMKbRycMjHYxRsdu2K', 'lx8OjR80H', 'baIUBHVlM'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, gvETgFFCQkiO5ZwjOd5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'N1tUvunN1r', 'N0WUMuATb8', 'pxUU55dGnP', 'yLKUfrGm3A', 'wYqUDPCiga', 'js0UjS5tZE', 'oUGUY0OCU8'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, QlAkGk67J1gBMEr0ut.csHigh entropy of concatenated method names: 'P59UcnjjyT', 'VhiU8V0tAJ', 'LIGUTywo1P', 'wahUxCA2Yv', 'JliUSNJFLM', 'TYhUb0OIje', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, CxjneHwxXsp7xkV5oM.csHigh entropy of concatenated method names: 'RYCS2HJGm8', 'CEcSi8p9ke', 'KTSSSZCedB', 'kY6S0fTkl3', 'ymnSEmTgHB', 'GHaSGEc8GQ', 'Dispose', 'jsyOWF1lvE', 'JxnOBa8Kq4', 'TynOcqQQ7T'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, Sx5rcdBKVAU4JT8ri0.csHigh entropy of concatenated method names: 'Dispose', 'Xp7FsxkV5o', 'mp5RloEtRk', 'RrY9offf6b', 'PrTF6CgeeP', 'DQNFzATcI0', 'ProcessDialogKey', 'xC2RCHwpPb', 'UiVRFCNyJ6', 'mZ9RR5lAkG'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, fvcsapb9hyjct1cgyo.csHigh entropy of concatenated method names: 'QYhmesgHix', 'D5smWPvDGk', 'OT2mBxvGI6', 'y8HmcstmqH', 'MKem82svJh', 'h2CmTKPYsL', 'goPmxfSrFJ', 'NAambQFR3s', 'UwPm48aZEJ', 'gEdmuG15eW'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, zeUtarV29xKxSitwgc.csHigh entropy of concatenated method names: 'zjUTGUtJXR', 'oW8Tq1jU3H', 'O2LTyByxec', 'MFSTIyOs1H', 'QxHThloJxZ', 'dn3THbbthU', 'IoPTKMSudw', 'f2yT9EH0Fo', 'zO2UrpRQtd7ssEaXakJ', 'Q6nqmmRH1rM9NuBGxQL'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, oHwpPbs1iVCNyJ6uZ9.csHigh entropy of concatenated method names: 'UgdSouJEws', 'jlNSlrKHns', 'rLtSdQTeWZ', 'QN3SVeIkn9', 'xt8SgUMYrk', 'aXoS3cU7Ty', 'rk8SQbmIgl', 'XlsS7sUU15', 'tKtSLrYjtU', 'OxLStDhEUr'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, VgGwDRfamFL6HnBMNM.csHigh entropy of concatenated method names: 'g6F2tVOkY4', 'B5M2MikWvh', 'txc2f9RAc8', 'xcU2DHwNYE', 'A662lm5RGf', 'Pp22dFt2LK', 'Bly2VHbUXt', 'gw82gowfUb', 'xHS23WmGms', 'mNt2QHj5CC'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, njX1TCKuYL6WcKUIDt.csHigh entropy of concatenated method names: 'vqIcIpdOcq', 'QyUchOKMsp', 'btTcrV1l3q', 'MDdcKXLeym', 'QT4c2XYRTB', 'DmYcnaFE0s', 'NfDcijoLeR', 'CJwcORBieB', 'iT2cSWCjfi', 'xsQcUYZkHj'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, GyW1pDFFymGCoeB5JPM.csHigh entropy of concatenated method names: 'gOLU68Tl5J', 'R6sUzhxRBG', 'W8i0CdYNAA', 'EFG0Fviv8V', 'QXX0R1TZZq', 'hC40mRIfu1', 'RJm0p1qOMh', 'gNx0enFu42', 'qaw0WdZVnb', 'KNZ0B0PZML'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, oTA4uZpBAR1Pn34sBj.csHigh entropy of concatenated method names: 'geOFxyyrd0', 'BBWFbMktoN', 'auYFuL6WcK', 'sIDFPtZcT9', 'pVUF2dx6Nq', 'DAqFnTa7Bc', 'RFZ9gmpXXf55S1Y19C', 'kiP3GNSIaWhtPUSa1T', 'psWFFXrjiN', 'ABgFmduXXv'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, iQjCGbLUgw19tJBgj8.csHigh entropy of concatenated method names: 'WKjxqekFvp', 'dssxNZ7WNa', 'sWQxyNLxIb', 'Gi3xIFEI7C', 'jRGxJ4CYwf', 'hh0xhfOgBk', 'AOExHTvADV', 'KvYxrnmAVM', 'qU7xKbcg0Y', 'H2nx9coTks'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, myoh9T1g26PdSlUSh9.csHigh entropy of concatenated method names: 'imoiaVU9ZC', 'AWni6VZHI7', 'yANOCnT2DK', 'IhMOFThWsR', 'AF4iv1mvQF', 'CogiMkx15g', 'Aqki5pQMl3', 'CJnifU7XY6', 'PkXiDVrjhl', 'i2TijjkhLe'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, ryyrd0rJBWMktoNnBP.csHigh entropy of concatenated method names: 'Aj4BfVc00h', 'OmfBDHpYCG', 'vSkBjmBFcn', 'DryBYtPiLD', 'Bs9BkfWfwu', 'Qy7B18jLYE', 'dD7BwboNbq', 'C8eBaPrpeQ', 'QcPBsL6uPu', 'kHNB6WPh9y'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, eQRwdmlmvTm3xc050d.csHigh entropy of concatenated method names: 'No9rCdR50VYHsKOmwWL', 'Af5tIbRXniQJjYudUOD', 'pMITOFC6je', 'GcXTSnsgNp', 'SatTU9cCHo', 'E3ThXJRjJZkDPXUKg8i', 'DiNRpkRPCy0aFfLJp0a', 'UPa5CCRbkmgMj9Mjwhe'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, eH5TYZcHM2Fog2XlKb.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'F5CRsqY41J', 'VJoR6V79mv', 'ER0RzcccE4', 'TEsmC7QKOT', 'q9emFufngH', 'nPOmRrkUOp', 'JXtmmDIni0', 'gYF8JyEJ9uAIgHWL25v'
            Source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, YNqHAqoTa7Bc1jXMj3.csHigh entropy of concatenated method names: 'G4NTe56W3G', 'yb3TBMHF3u', 'p2RT84X4ax', 'Y2sTxEuDSj', 'wnRTbmfbZH', 'zSQ8ktF9Vo', 'bml81qBijV', 'qt78wCGvsX', 'lvI8aIwKEW', 'CDo8sIcOee'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, hyU2kP523bNQjHxmN6.csHigh entropy of concatenated method names: 'qypZr4Wdex', 'MVAZKnVsuL', 'H1XZoCdS8A', 'yobZl6CgOn', 'fqaZVEFD8a', 'hUoZgvTjmD', 'jgBZQ87q4Q', 'cniZ7gGIZR', 'We8ZtdFLMZ', 'rKSZvxQape'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, GlYTWZQchbpgpPIbhn.csHigh entropy of concatenated method names: 'iqZxWEmT50', 'LP3xcnU3yJ', 'gcExTG74hE', 'IhmT6QWfmt', 'bRWTz3feKY', 'TdDxCr0f3L', 'gYfxFpG8TZ', 'sBYxRyRfjH', 'S41xmHfjgW', 'I3Pxp5epBG'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, gPtxAqz3n1yngklp8s.csHigh entropy of concatenated method names: 'i0TUhFrR3C', 'VOZUrXXMAY', 'LwGUKFwUTA', 'U1kUoX7Mxp', 'GqBUlApgHx', 'hrSUVVn5yD', 'Ek4UgeyFuj', 'J4WUGlrCXE', 'QrgUquswYN', 'cTDUNismqh'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, jOhEAcjYMhnccghhMt.csHigh entropy of concatenated method names: 'ToString', 'JbMnvgCS85', 'YmknlpMHNj', 'EE8nd9DP6o', 'jEknVKsqvp', 'SX1ngr9Cxc', 'CiLn32C35y', 'K47nQiDCfn', 'aepn7wgRdI', 'M3inLtL8ir'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, Jkq2AORLRPsL0TItgA.csHigh entropy of concatenated method names: 'sGdyYUZXU', 'Hd4IMkrY4', 'bIXh0Rnq5', 'wZyHiOyoS', 'dOYK8Bi5b', 'iKh9gxGta', 'j088oTBldIdVN4XKsk', 'pMKbRycMjHYxRsdu2K', 'lx8OjR80H', 'baIUBHVlM'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, gvETgFFCQkiO5ZwjOd5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'N1tUvunN1r', 'N0WUMuATb8', 'pxUU55dGnP', 'yLKUfrGm3A', 'wYqUDPCiga', 'js0UjS5tZE', 'oUGUY0OCU8'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, QlAkGk67J1gBMEr0ut.csHigh entropy of concatenated method names: 'P59UcnjjyT', 'VhiU8V0tAJ', 'LIGUTywo1P', 'wahUxCA2Yv', 'JliUSNJFLM', 'TYhUb0OIje', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, CxjneHwxXsp7xkV5oM.csHigh entropy of concatenated method names: 'RYCS2HJGm8', 'CEcSi8p9ke', 'KTSSSZCedB', 'kY6S0fTkl3', 'ymnSEmTgHB', 'GHaSGEc8GQ', 'Dispose', 'jsyOWF1lvE', 'JxnOBa8Kq4', 'TynOcqQQ7T'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, Sx5rcdBKVAU4JT8ri0.csHigh entropy of concatenated method names: 'Dispose', 'Xp7FsxkV5o', 'mp5RloEtRk', 'RrY9offf6b', 'PrTF6CgeeP', 'DQNFzATcI0', 'ProcessDialogKey', 'xC2RCHwpPb', 'UiVRFCNyJ6', 'mZ9RR5lAkG'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, fvcsapb9hyjct1cgyo.csHigh entropy of concatenated method names: 'QYhmesgHix', 'D5smWPvDGk', 'OT2mBxvGI6', 'y8HmcstmqH', 'MKem82svJh', 'h2CmTKPYsL', 'goPmxfSrFJ', 'NAambQFR3s', 'UwPm48aZEJ', 'gEdmuG15eW'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, zeUtarV29xKxSitwgc.csHigh entropy of concatenated method names: 'zjUTGUtJXR', 'oW8Tq1jU3H', 'O2LTyByxec', 'MFSTIyOs1H', 'QxHThloJxZ', 'dn3THbbthU', 'IoPTKMSudw', 'f2yT9EH0Fo', 'zO2UrpRQtd7ssEaXakJ', 'Q6nqmmRH1rM9NuBGxQL'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, oHwpPbs1iVCNyJ6uZ9.csHigh entropy of concatenated method names: 'UgdSouJEws', 'jlNSlrKHns', 'rLtSdQTeWZ', 'QN3SVeIkn9', 'xt8SgUMYrk', 'aXoS3cU7Ty', 'rk8SQbmIgl', 'XlsS7sUU15', 'tKtSLrYjtU', 'OxLStDhEUr'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, VgGwDRfamFL6HnBMNM.csHigh entropy of concatenated method names: 'g6F2tVOkY4', 'B5M2MikWvh', 'txc2f9RAc8', 'xcU2DHwNYE', 'A662lm5RGf', 'Pp22dFt2LK', 'Bly2VHbUXt', 'gw82gowfUb', 'xHS23WmGms', 'mNt2QHj5CC'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, njX1TCKuYL6WcKUIDt.csHigh entropy of concatenated method names: 'vqIcIpdOcq', 'QyUchOKMsp', 'btTcrV1l3q', 'MDdcKXLeym', 'QT4c2XYRTB', 'DmYcnaFE0s', 'NfDcijoLeR', 'CJwcORBieB', 'iT2cSWCjfi', 'xsQcUYZkHj'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, GyW1pDFFymGCoeB5JPM.csHigh entropy of concatenated method names: 'gOLU68Tl5J', 'R6sUzhxRBG', 'W8i0CdYNAA', 'EFG0Fviv8V', 'QXX0R1TZZq', 'hC40mRIfu1', 'RJm0p1qOMh', 'gNx0enFu42', 'qaw0WdZVnb', 'KNZ0B0PZML'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, oTA4uZpBAR1Pn34sBj.csHigh entropy of concatenated method names: 'geOFxyyrd0', 'BBWFbMktoN', 'auYFuL6WcK', 'sIDFPtZcT9', 'pVUF2dx6Nq', 'DAqFnTa7Bc', 'RFZ9gmpXXf55S1Y19C', 'kiP3GNSIaWhtPUSa1T', 'psWFFXrjiN', 'ABgFmduXXv'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, iQjCGbLUgw19tJBgj8.csHigh entropy of concatenated method names: 'WKjxqekFvp', 'dssxNZ7WNa', 'sWQxyNLxIb', 'Gi3xIFEI7C', 'jRGxJ4CYwf', 'hh0xhfOgBk', 'AOExHTvADV', 'KvYxrnmAVM', 'qU7xKbcg0Y', 'H2nx9coTks'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, myoh9T1g26PdSlUSh9.csHigh entropy of concatenated method names: 'imoiaVU9ZC', 'AWni6VZHI7', 'yANOCnT2DK', 'IhMOFThWsR', 'AF4iv1mvQF', 'CogiMkx15g', 'Aqki5pQMl3', 'CJnifU7XY6', 'PkXiDVrjhl', 'i2TijjkhLe'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, ryyrd0rJBWMktoNnBP.csHigh entropy of concatenated method names: 'Aj4BfVc00h', 'OmfBDHpYCG', 'vSkBjmBFcn', 'DryBYtPiLD', 'Bs9BkfWfwu', 'Qy7B18jLYE', 'dD7BwboNbq', 'C8eBaPrpeQ', 'QcPBsL6uPu', 'kHNB6WPh9y'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, eQRwdmlmvTm3xc050d.csHigh entropy of concatenated method names: 'No9rCdR50VYHsKOmwWL', 'Af5tIbRXniQJjYudUOD', 'pMITOFC6je', 'GcXTSnsgNp', 'SatTU9cCHo', 'E3ThXJRjJZkDPXUKg8i', 'DiNRpkRPCy0aFfLJp0a', 'UPa5CCRbkmgMj9Mjwhe'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, eH5TYZcHM2Fog2XlKb.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'F5CRsqY41J', 'VJoR6V79mv', 'ER0RzcccE4', 'TEsmC7QKOT', 'q9emFufngH', 'nPOmRrkUOp', 'JXtmmDIni0', 'gYF8JyEJ9uAIgHWL25v'
            Source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, YNqHAqoTa7Bc1jXMj3.csHigh entropy of concatenated method names: 'G4NTe56W3G', 'yb3TBMHF3u', 'p2RT84X4ax', 'Y2sTxEuDSj', 'wnRTbmfbZH', 'zSQ8ktF9Vo', 'bml81qBijV', 'qt78wCGvsX', 'lvI8aIwKEW', 'CDo8sIcOee'
            Source: C:\Users\user\Desktop\Payment slip.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: 27A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: 29C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: 2810000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: 4F30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: 5F30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: 6060000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: 7060000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: AE00000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: BE00000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: C290000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: D290000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: 1450000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: 30C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: 2EA0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599641Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599516Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599407Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599282Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599157Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599032Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598907Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598797Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598688Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598405Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598284Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598157Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598032Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597907Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597797Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597688Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597563Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597438Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597313Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597188Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597078Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596969Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596844Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596735Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595985Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595835Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595516Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595391Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595266Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595157Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595032Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594907Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594797Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594688Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594563Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594438Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594313Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594188Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594078Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 593969Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeWindow / User API: threadDelayed 7543Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeWindow / User API: threadDelayed 2286Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7532Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7584Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep count: 39 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -35971150943733603s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -599891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7264Thread sleep count: 7543 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7264Thread sleep count: 2286 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -599766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -599641s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -599516s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -599407s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -599282s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -599157s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -599032s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -598907s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -598797s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -598688s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -598405s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -598284s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -598157s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -598032s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -597907s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -597797s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -597688s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -597563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -597438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -597313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -597188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -597078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -596969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -596844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -596735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -596610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -596485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -596360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -596235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -596110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -595985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -595835s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -595735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -595625s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -595516s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -595391s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -595266s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -595157s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -595032s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -594907s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -594797s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -594688s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -594563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -594438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -594313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -594188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -594078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exe TID: 7220Thread sleep time: -593969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 30000Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599641Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599516Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599407Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599282Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599157Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 599032Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598907Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598797Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598688Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598405Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598284Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598157Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 598032Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597907Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597797Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597688Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597563Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597438Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597313Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597188Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 597078Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596969Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596844Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596735Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595985Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595835Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595516Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595391Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595266Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595157Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 595032Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594907Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594797Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594688Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594563Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594438Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594313Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594188Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 594078Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeThread delayed: delay time: 593969Jump to behavior
            Source: Payment slip.exe, 00000003.00000002.3659737346.00000000014C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\Payment slip.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Payment slip.exeMemory written: C:\Users\user\Desktop\Payment slip.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeProcess created: C:\Users\user\Desktop\Payment slip.exe "C:\Users\user\Desktop\Payment slip.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Users\user\Desktop\Payment slip.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Users\user\Desktop\Payment slip.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 1.2.Payment slip.exe.443a310.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.Payment slip.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Payment slip.exe.443a310.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3660519204.000000000328F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3660519204.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Payment slip.exe PID: 7528, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Payment slip.exe PID: 7692, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Payment slip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\Payment slip.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 1.2.Payment slip.exe.443a310.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.Payment slip.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Payment slip.exe.443a310.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Payment slip.exe PID: 7528, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Payment slip.exe PID: 7692, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 1.2.Payment slip.exe.443a310.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.Payment slip.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Payment slip.exe.443a310.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Payment slip.exe.43d50f0.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Payment slip.exe.436fed0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3660519204.000000000328F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3660519204.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Payment slip.exe PID: 7528, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Payment slip.exe PID: 7692, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
            DLL Side-Loading
            111
            Process Injection
            1
            Masquerading
            1
            OS Credential Dumping
            1
            Query Registry
            Remote Services1
            Email Collection
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory1
            Security Software Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
            Process Injection
            NTDS31
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Obfuscated Files or Information
            Cached Domain Credentials1
            System Network Configuration Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
            Software Packing
            DCSync13
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Payment slip.exe44%VirustotalBrowse
            Payment slip.exe61%ReversingLabsWin32.Backdoor.njRAT
            Payment slip.exe100%AviraHEUR/AGEN.1306911
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            reallyfreegeoip.org
            104.21.16.1
            truefalse
              high
              checkip.dyndns.com
              193.122.6.168
              truefalse
                high
                checkip.dyndns.org
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://checkip.dyndns.org/false
                    high
                    https://reallyfreegeoip.org/xml/8.46.123.189false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://reallyfreegeoip.orgPayment slip.exe, 00000003.00000002.3660519204.0000000003237000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003245000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003273000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003229000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003189000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000321C000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.00000000031CC000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://checkip.dyndns.orgPayment slip.exe, 00000003.00000002.3660519204.0000000003237000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000317D000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003245000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003253000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003273000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003229000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003189000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000321C000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.00000000031CC000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.comPayment slip.exe, 00000003.00000002.3660519204.0000000003237000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003245000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003273000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003229000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003189000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000321C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePayment slip.exe, 00000003.00000002.3660519204.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.org/qPayment slip.exe, 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.org/xml/8.46.123.189$Payment slip.exe, 00000003.00000002.3660519204.0000000003237000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003245000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003273000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003229000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000321C000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.00000000031CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://reallyfreegeoip.orgPayment slip.exe, 00000003.00000002.3660519204.0000000003237000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003245000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003273000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003229000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003281000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.000000000321C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://reallyfreegeoip.org/xml/Payment slip.exe, 00000001.00000002.1216305549.00000000041C9000.00000004.00000800.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3658162162.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Payment slip.exe, 00000003.00000002.3660519204.0000000003189000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      104.21.16.1
                                      reallyfreegeoip.orgUnited States
                                      13335CLOUDFLARENETUSfalse
                                      193.122.6.168
                                      checkip.dyndns.comUnited States
                                      31898ORACLE-BMC-31898USfalse
                                      Joe Sandbox version:42.0.0 Malachite
                                      Analysis ID:1638158
                                      Start date and time:2025-03-14 09:09:11 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 7m 37s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:13
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:Payment slip.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                                      EGA Information:
                                      • Successful, ratio: 50%
                                      HCA Information:
                                      • Successful, ratio: 97%
                                      • Number of executed functions: 153
                                      • Number of non-executed functions: 32
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 23.60.203.209, 20.109.210.53
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target Payment slip.exe, PID 7692 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      TimeTypeDescription
                                      04:10:05API Interceptor11209396x Sleep call for process: Payment slip.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      104.21.16.1https://t.co/6BJID9q49hGet hashmaliciousHTMLPhisherBrowse
                                      • tcerfw.wittnng.sbs/favicon.ico
                                      J8bamK92a3.exeGet hashmaliciousFormBookBrowse
                                      • www.play-vanguard-nirvana.xyz/egs9/?9r=2m/uVQwqKH2EIWlawszTKzvIepBfVH/HI19qzylF05nDLsWuBLn1pb4DiFDKEzYOkwPMwL8bVA==&vZR=H2MpG0p
                                      0t7MXNEfCg.exeGet hashmaliciousFormBookBrowse
                                      • www.rbopisalive.cyou/2dxw/
                                      g1V10ssekg.exeGet hashmaliciousFormBookBrowse
                                      • www.sigaque.today/n61y/?UPV=BOlfS7N9ZWkGRIMRgNC6B6+WUTyM673eSjZAzliNIDKZHnAeT7/5dfTbZtimq+dx8K4CQjPcymznAMXPWSrBBYPYz0JSQDMkWzhvpNbFnW2/OcjAWw==&YrV=FlsDgRMx
                                      0IrTeguWM7.exeGet hashmaliciousFormBookBrowse
                                      • www.tumbetgirislinki.fit/ftbq/
                                      Shipping Document.exeGet hashmaliciousFormBookBrowse
                                      • www.rbopisalive.cyou/6m32/
                                      Payment Record.exe