Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
U02LaPwnkd.exe

Overview

General Information

Sample name:U02LaPwnkd.exe
renamed because original name is a hash value
Original sample name:d63792ee67c6f1702188695387c64991029dabd702d48eac3ea3f0eef280d4a1.exe
Analysis ID:1585557
MD5:6871972206b4d156c2246dfc3213e330
SHA1:cf9310a71c1410cfa2bc7a01379d88e208545817
SHA256:d63792ee67c6f1702188695387c64991029dabd702d48eac3ea3f0eef280d4a1
Infos:

Detection

ValleyRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected UAC Bypass using CMSTP
Yara detected ValleyRAT
AI detected suspicious sample
Contains functionality to inject threads in other processes
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain checking for user administrative privileges
Loading BitLocker PowerShell Module
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • U02LaPwnkd.exe (PID: 4040 cmdline: "C:\Users\user\Desktop\U02LaPwnkd.exe" MD5: 6871972206B4D156C2246DFC3213E330)
    • powershell.exe (PID: 7096 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7492 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • WINWORD.EXE (PID: 5748 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
  • CompMgmtLauncher.exe (PID: 1252 cmdline: C:\Windows\System32\CompMgmtLauncher.exe MD5: FF9690925244473ECC4C2E5B535B8599)
    • mmc.exe (PID: 7680 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\system32\compmgmt.msc" /s MD5: 58C9E5172C3708A6971CA0CBC80FE8B8)
  • svchost.exe (PID: 5588 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
U02LaPwnkd.exemalware_valleyrat_strings_configValleyRAT strings based on HIVE KEYS and config. Sekoia.io
  • 0x1126f0:$key1: IpDateInfo
  • 0x1127b0:$key2: IpDate
  • 0x112690:$key3: SelfPath
  • 0x125970:$config1: 7C 00 69 00 3A 00
  • 0x125992:$config2: 7C 00 70 00 3A 00
SourceRuleDescriptionAuthorStrings
00000000.00000002.4477912347.000001C0D26A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_ValleyRATYara detected ValleyRATJoe Security
    00000000.00000002.4477912347.000001C0D26A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      00000000.00000002.4477912347.000001C0D26A0000.00000040.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
      • 0x3f2f0:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
      • 0x448f8:$s1: CoGetObject
      • 0x3f2a8:$s2: Elevation:Administrator!new:
      00000000.00000002.4476822143.000001C0D2650000.00000010.00001000.00020000.00000000.sdmpJoeSecurity_ValleyRATYara detected ValleyRATJoe Security
        00000000.00000002.4476822143.000001C0D2650000.00000010.00001000.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          Click to see the 2 entries
          SourceRuleDescriptionAuthorStrings
          0.2.U02LaPwnkd.exe.1c0d26506d1.0.unpackJoeSecurity_ValleyRATYara detected ValleyRATJoe Security
            0.2.U02LaPwnkd.exe.1c0d26506d1.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              0.2.U02LaPwnkd.exe.1c0d26506d1.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
              • 0x3c6f0:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
              • 0x41cf8:$s1: CoGetObject
              • 0x3c6a8:$s2: Elevation:Administrator!new:
              0.2.U02LaPwnkd.exe.1c0d26a0000.1.raw.unpackJoeSecurity_ValleyRATYara detected ValleyRATJoe Security
                0.2.U02LaPwnkd.exe.1c0d26a0000.1.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  Click to see the 9 entries

                  System Summary

                  barindex
                  Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\U02LaPwnkd.exe, ProcessId: 4040, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\U02LaPwnkd.exe", ParentImage: C:\Users\user\Desktop\U02LaPwnkd.exe, ParentProcessId: 4040, ParentProcessName: U02LaPwnkd.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7096, ProcessName: powershell.exe
                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 5588, ProcessName: svchost.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: U02LaPwnkd.exeAvira: detected
                  Source: U02LaPwnkd.exeReversingLabs: Detection: 73%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability

                  Exploits

                  barindex
                  Source: Yara matchFile source: 0.2.U02LaPwnkd.exe.1c0d26506d1.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.U02LaPwnkd.exe.1c0d26a0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.U02LaPwnkd.exe.1c0d26a0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.U02LaPwnkd.exe.1c0d26506d1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.4477912347.000001C0D26A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4476822143.000001C0D2650000.00000010.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: U02LaPwnkd.exe PID: 4040, type: MEMORYSTR
                  Source: U02LaPwnkd.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: Binary string: .pdbs" source: mmc.exe, 0000000D.00000002.4497150514.0000000003E41000.00000004.00000020.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26C2A0C FindFirstFileExW,0_2_000001C0D26C2A0C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC93EFF4 FindFirstFileExA,0_2_00007FF6DC93EFF4
                  Source: C:\Windows\System32\CompMgmtLauncher.exeFile opened: C:\Users\userJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeFile opened: C:\Users\user\AppDataJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A1E00 IsUserAnAdmin,OutputDebugStringA,NetWkstaGetInfo,NetApiBufferFree,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,OutputDebugStringA,OutputDebugStringA,Sleep,OutputDebugStringA,NetWkstaGetInfo,NetApiBufferFree,OutputDebugStringA,CoUninitialize,InternetCheckConnectionA,GetTempPathA,DeleteFileA,CreateFileA,FindExecutableA,WinExec,MessageBoxA,ExitProcess,NetWkstaGetInfo,NetApiBufferFree,ExitProcess,0_2_000001C0D26A1E00
                  Source: global trafficTCP traffic: 192.168.2.5:49705 -> 154.91.226.158:5689
                  Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
                  Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.91.226.158
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.91.226.158
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.91.226.158
                  Source: unknownTCP traffic detected without corresponding DNS query: 154.91.226.158
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26AA5D0 recv,0_2_000001C0D26AA5D0
                  Source: global trafficDNS traffic detected: DNS query: www.baidu.com
                  Source: powershell.exe, 00000002.00000002.2211348319.0000019B6407C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mic
                  Source: powershell.exe, 00000002.00000002.2211348319.0000019B6407C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micft.cMicRosof
                  Source: svchost.exe, 00000006.00000002.3801955488.0000015D88C0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                  Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                  Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                  Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                  Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                  Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                  Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                  Source: edb.log.6.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                  Source: powershell.exe, 00000002.00000002.2192765826.0000019B5B7ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4BA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4BA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4B761000.00000004.00000800.00020000.00000000.sdmp, mmc.exe, 0000000D.00000002.4497689332.0000000005837000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4BA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4BA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: U02LaPwnkd.exe, 00000000.00000002.4476822143.000001C0D2650000.00000010.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.baidu.com
                  Source: powershell.exe, 00000002.00000002.2203230701.0000019B63C01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.t.com/pk
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4B761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4B761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4B761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6xG
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4D394000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4D394000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4D394000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: edb.log.6.drString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
                  Source: svchost.exe, 00000006.00000003.2082584587.0000015D88AF0000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.6.dr, edb.log.6.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4BA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: powershell.exe, 00000002.00000002.2161768322.0000019B4D394000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                  Source: powershell.exe, 00000002.00000002.2192765826.0000019B5B7ED000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2161768322.0000019B4D394000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: qmgr.db.6.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe/C:

                  System Summary

                  barindex
                  Source: U02LaPwnkd.exe, type: SAMPLEMatched rule: ValleyRAT strings based on HIVE KEYS and config. Author: Sekoia.io
                  Source: 0.2.U02LaPwnkd.exe.1c0d26506d1.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.U02LaPwnkd.exe.1c0d26a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.U02LaPwnkd.exe.1c0d26a0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.U02LaPwnkd.exe.1c0d26506d1.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.0.U02LaPwnkd.exe.7ff6dc8e0000.0.unpack, type: UNPACKEDPEMatched rule: ValleyRAT strings based on HIVE KEYS and config. Author: Sekoia.io
                  Source: 0.2.U02LaPwnkd.exe.7ff6dc8e0000.2.unpack, type: UNPACKEDPEMatched rule: ValleyRAT strings based on HIVE KEYS and config. Author: Sekoia.io
                  Source: 00000000.00000002.4477912347.000001C0D26A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A6330 OpenProcess,NtQuerySystemInformation,GetCurrentProcessId,CloseHandle,OutputDebugStringA,NtQuerySystemInformation,OpenProcess,OpenProcess,VirtualAllocEx,TerminateProcess,OpenProcess,WriteProcessMemory,WriteProcessMemory,LoadLibraryW,GetProcAddress,CreateRemoteThread,WaitForSingleObject,OutputDebugStringA,VirtualFreeEx,OutputDebugStringA,0_2_000001C0D26A6330
                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A2D700_2_000001C0D26A2D70
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A57F00_2_000001C0D26A57F0
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A26300_2_000001C0D26A2630
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A1E000_2_000001C0D26A1E00
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A4DD00_2_000001C0D26A4DD0
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26B63CC0_2_000001C0D26B63CC
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A74900_2_000001C0D26A7490
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26B9C600_2_000001C0D26B9C60
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A25AB0_2_000001C0D26A25AB
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26B25A40_2_000001C0D26B25A4
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26C2A0C0_2_000001C0D26C2A0C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26BC2180_2_000001C0D26BC218
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26C19F80_2_000001C0D26C19F8
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26C72A20_2_000001C0D26C72A2
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26AB2BC0_2_000001C0D26AB2BC
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26C4A600_2_000001C0D26C4A60
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26C124C0_2_000001C0D26C124C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26BE32C0_2_000001C0D26BE32C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26B23200_2_000001C0D26B2320
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A63300_2_000001C0D26A6330
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26C5B8C0_2_000001C0D26C5B8C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A3B900_2_000001C0D26A3B90
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A38000_2_000001C0D26A3800
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26C28000_2_000001C0D26C2800
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26BCFFC0_2_000001C0D26BCFFC
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26B510C0_2_000001C0D26B510C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26C88F00_2_000001C0D26C88F0
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A3E900_2_000001C0D26A3E90
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26B5EC00_2_000001C0D26B5EC0
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26B57980_2_000001C0D26B5798
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC928D600_2_00007FF6DC928D60
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC93EDE80_2_00007FF6DC93EDE8
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC940E200_2_00007FF6DC940E20
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC932ECC0_2_00007FF6DC932ECC
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC942F700_2_00007FF6DC942F70
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC92A92C0_2_00007FF6DC92A92C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC93C9380_2_00007FF6DC93C938
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC9359500_2_00007FF6DC935950
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC9311980_2_00007FF6DC931198
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC93F9980_2_00007FF6DC93F998
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC934B1C0_2_00007FF6DC934B1C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC9333100_2_00007FF6DC933310
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC942AA00_2_00007FF6DC942AA0
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC935C340_2_00007FF6DC935C34
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC93D4040_2_00007FF6DC93D404
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC9314140_2_00007FF6DC931414
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC9444440_2_00007FF6DC944444
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26714C90_2_000001C0D26714C9
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D265AD8D0_2_000001C0D265AD8D
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26652690_2_000001C0D2665269
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26552C10_2_000001C0D26552C1
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D266CACD0_2_000001C0D266CACD
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26532D10_2_000001C0D26532D1
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26620750_2_000001C0D2662075
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26528410_2_000001C0D2652841
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26521010_2_000001C0D2652101
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26539610_2_000001C0D2653961
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D2655E010_2_000001C0D2655E01
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D2661DF10_2_000001C0D2661DF1
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26536610_2_000001C0D2653661
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26697310_2_000001C0D2669731
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D2656F610_2_000001C0D2656F61
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F376902_2_00007FF848F37690
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F3CADB2_2_00007FF848F3CADB
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F3CC302_2_00007FF848F3CC30
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F3F4602_2_00007FF848F3F460
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F3CBD52_2_00007FF848F3CBD5
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F360452_2_00007FF848F36045
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F3E8782_2_00007FF848F3E878
                  Source: C:\Windows\System32\mmc.exeProcess token adjusted: SecurityJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: String function: 000001C0D26A8D60 appears 68 times
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: String function: 000001C0D26CD130 appears 52 times
                  Source: U02LaPwnkd.exeStatic PE information: invalid certificate
                  Source: U02LaPwnkd.exe, 00000000.00000000.2018996644.00007FF6DCA73000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWinWordB" vs U02LaPwnkd.exe
                  Source: U02LaPwnkd.exeBinary or memory string: OriginalFilenameWinWordB" vs U02LaPwnkd.exe
                  Source: U02LaPwnkd.exe, type: SAMPLEMatched rule: malware_valleyrat_strings_config author = Sekoia.io, description = ValleyRAT strings based on HIVE KEYS and config. , creation_date = 2024-08-19, classification = TLP:CLEAR, version = 1.0, id = bb186ab7-60cd-487e-8b9c-c2ff8f121454, hash = 54ba4bbeacd1521164a40e92262b15f6
                  Source: 0.2.U02LaPwnkd.exe.1c0d26506d1.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.U02LaPwnkd.exe.1c0d26a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.U02LaPwnkd.exe.1c0d26a0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.U02LaPwnkd.exe.1c0d26506d1.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.0.U02LaPwnkd.exe.7ff6dc8e0000.0.unpack, type: UNPACKEDPEMatched rule: malware_valleyrat_strings_config author = Sekoia.io, description = ValleyRAT strings based on HIVE KEYS and config. , creation_date = 2024-08-19, classification = TLP:CLEAR, version = 1.0, id = bb186ab7-60cd-487e-8b9c-c2ff8f121454, hash = 54ba4bbeacd1521164a40e92262b15f6
                  Source: 0.2.U02LaPwnkd.exe.7ff6dc8e0000.2.unpack, type: UNPACKEDPEMatched rule: malware_valleyrat_strings_config author = Sekoia.io, description = ValleyRAT strings based on HIVE KEYS and config. , creation_date = 2024-08-19, classification = TLP:CLEAR, version = 1.0, id = bb186ab7-60cd-487e-8b9c-c2ff8f121454, hash = 54ba4bbeacd1521164a40e92262b15f6
                  Source: 00000000.00000002.4477912347.000001C0D26A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@12/10@1/3
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A6900 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,0_2_000001C0D26A6900
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A66E0 CreateToolhelp32Snapshot,OutputDebugStringA,OutputDebugStringA,Process32FirstW,Process32NextW,CloseHandle,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,0_2_000001C0D26A66E0
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A4AC0 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_000001C0D26A4AC0
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A9F60 CoInitialize,CoInitializeEx,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,_com_util::ConvertStringToBSTR,SysFreeString,CoUninitialize,CoUninitialize,0_2_000001C0D26A9F60
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveJump to behavior
                  Source: C:\Windows\System32\mmc.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5804:120:WilError_03
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeFile created: C:\Users\user\AppData\Local\Temp\dome.docJump to behavior
                  Source: U02LaPwnkd.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: U02LaPwnkd.exeReversingLabs: Detection: 73%
                  Source: U02LaPwnkd.exeString found in binary or memory: a5dcbddc-addc-95dc-dc9d-dc85dc8ddc75
                  Source: U02LaPwnkd.exeString found in binary or memory: b5dbc575-a5db-addb-db95-db9ddb85db8d
                  Source: U02LaPwnkd.exeString found in binary or memory: fddb15db-c5db-addb-db75-da4dda1ddae5
                  Source: U02LaPwnkd.exeString found in binary or memory: 75750175-a575-add6-d695-d69dd685d68d
                  Source: U02LaPwnkd.exeString found in binary or memory: b5dbc575-a5db-addb-db95-db9ddb85db8d
                  Source: U02LaPwnkd.exeString found in binary or memory: a5dcbddc-addc-95dc-dc9d-dc85dc8ddc75
                  Source: U02LaPwnkd.exeString found in binary or memory: 75750175-a575-add6-d695-d69dd685d68d
                  Source: U02LaPwnkd.exeString found in binary or memory: fddb15db-c5db-addb-db75-da4dda1ddae5
                  Source: unknownProcess created: C:\Users\user\Desktop\U02LaPwnkd.exe "C:\Users\user\Desktop\U02LaPwnkd.exe"
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE"
                  Source: unknownProcess created: C:\Windows\System32\CompMgmtLauncher.exe C:\Windows\System32\CompMgmtLauncher.exe
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Windows\System32\CompMgmtLauncher.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\system32\compmgmt.msc" /s
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE"Jump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\system32\compmgmt.msc" /sJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: cscapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: twext.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: cscui.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: cscobj.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: cscapi.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: workfoldersshell.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: ntshrui.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: starttiledata.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: usermgrcli.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: usermgrproxy.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: pcacli.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: acgenral.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: duser.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: ninput.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: mmcndmgr.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: msxml6.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: els.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: dsrole.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: logoncli.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: ntdsapi.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: activeds.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: adsldpc.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: adsldpc.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: riched32.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: riched20.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: usp10.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: mycomput.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: filemgmt.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: localsec.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: wdc.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: pdhui.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: credui.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: utildll.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: dmdskmgr.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: dmutil.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: dmdskres.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: dmdskres2.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: devmgr.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: newdev.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: devobj.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: devrtl.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: riched32.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: riched20.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: usp10.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: oleacc.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: mlang.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: dataexchange.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: dcomp.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: atlthunk.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\mmc.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                  Source: C:\Windows\System32\mmc.exeWindow found: window name: msctls_updown32Jump to behavior
                  Source: C:\Windows\System32\mmc.exeFile opened: C:\Windows\system32\riched32.dllJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
                  Source: U02LaPwnkd.exeStatic PE information: Image base 0x140000000 > 0x60000000
                  Source: U02LaPwnkd.exeStatic file information: File size 1822824 > 1048576
                  Source: U02LaPwnkd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: U02LaPwnkd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: U02LaPwnkd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: U02LaPwnkd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: U02LaPwnkd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: U02LaPwnkd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: U02LaPwnkd.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: U02LaPwnkd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: .pdbs" source: mmc.exe, 0000000D.00000002.4497150514.0000000003E41000.00000004.00000020.00020000.00000000.sdmp
                  Source: U02LaPwnkd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: U02LaPwnkd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: U02LaPwnkd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: U02LaPwnkd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: U02LaPwnkd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A6330 OpenProcess,NtQuerySystemInformation,GetCurrentProcessId,CloseHandle,OutputDebugStringA,NtQuerySystemInformation,OpenProcess,OpenProcess,VirtualAllocEx,TerminateProcess,OpenProcess,WriteProcessMemory,WriteProcessMemory,LoadLibraryW,GetProcAddress,CreateRemoteThread,WaitForSingleObject,OutputDebugStringA,VirtualFreeEx,OutputDebugStringA,0_2_000001C0D26A6330
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26B765A push rdx; retf 0_2_000001C0D26B765B
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D266712B push edx; retf 0_2_000001C0D266712C
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848E1D2A5 pushad ; iretd 2_2_00007FF848E1D2A6
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F38B98 push eax; ret 2_2_00007FF848F38BA1
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848F300BD pushad ; iretd 2_2_00007FF848F300C1
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF8490071C5 push ebp; retf 2_2_00007FF8490071C8

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: office.png
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26AB2BC GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_000001C0D26AB2BC
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-41829
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNodegraph_0-41826
                  Source: C:\Windows\System32\mmc.exeMemory allocated: 4030000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\System32\mmc.exeMemory allocated: 5370000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A6330 OpenProcess,NtQuerySystemInformation,GetCurrentProcessId,CloseHandle,OutputDebugStringA,NtQuerySystemInformation,OpenProcess,OpenProcess,VirtualAllocEx,TerminateProcess,OpenProcess,WriteProcessMemory,WriteProcessMemory,LoadLibraryW,GetProcAddress,CreateRemoteThread,WaitForSingleObject,OutputDebugStringA,VirtualFreeEx,OutputDebugStringA,0_2_000001C0D26A6330
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\mmc.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\mmc.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4953Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1732Jump to behavior
                  Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 496Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5972Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3136Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\System32\svchost.exe TID: 6496Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\svchost.exe TID: 5560Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\mmc.exe TID: 7892Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                  Source: C:\Windows\System32\mmc.exe TID: 7892Thread sleep time: -42186s >= -30000sJump to behavior
                  Source: C:\Windows\System32\mmc.exe TID: 7892Thread sleep time: -31500s >= -30000sJump to behavior
                  Source: C:\Windows\System32\mmc.exe TID: 7892Thread sleep time: -32876s >= -30000sJump to behavior
                  Source: C:\Windows\System32\mmc.exe TID: 7892Thread sleep time: -30500s >= -30000sJump to behavior
                  Source: C:\Windows\System32\mmc.exe TID: 7892Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26C2A0C FindFirstFileExW,0_2_000001C0D26C2A0C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC93EFF4 FindFirstFileExA,0_2_00007FF6DC93EFF4
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26B4EBC VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,0_2_000001C0D26B4EBC
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\mmc.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\mmc.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeFile opened: C:\Users\userJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeFile opened: C:\Users\user\AppDataJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
                  Source: U02LaPwnkd.exe, 00000000.00000002.4475875985.000001C0D0C7C000.00000004.00000020.00020000.00000000.sdmp, U02LaPwnkd.exe, 00000000.00000002.4475875985.000001C0D0CDB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3810236427.0000015D88C58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: svchost.exe, 00000006.00000002.3769142773.0000015D8362B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26B4C08 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000001C0D26B4C08
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26ABD44 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_000001C0D26ABD44
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A6330 OpenProcess,NtQuerySystemInformation,GetCurrentProcessId,CloseHandle,OutputDebugStringA,NtQuerySystemInformation,OpenProcess,OpenProcess,VirtualAllocEx,TerminateProcess,OpenProcess,WriteProcessMemory,WriteProcessMemory,LoadLibraryW,GetProcAddress,CreateRemoteThread,WaitForSingleObject,OutputDebugStringA,VirtualFreeEx,OutputDebugStringA,0_2_000001C0D26A6330
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A6330 OpenProcess,NtQuerySystemInformation,GetCurrentProcessId,CloseHandle,OutputDebugStringA,NtQuerySystemInformation,OpenProcess,OpenProcess,VirtualAllocEx,TerminateProcess,OpenProcess,WriteProcessMemory,WriteProcessMemory,LoadLibraryW,GetProcAddress,CreateRemoteThread,WaitForSingleObject,OutputDebugStringA,VirtualFreeEx,OutputDebugStringA,0_2_000001C0D26A6330
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26C3BE8 GetProcessHeap,0_2_000001C0D26C3BE8
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26B4C08 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000001C0D26B4C08
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26ACE6C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000001C0D26ACE6C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC92FDFC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6DC92FDFC
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC92BD98 SetUnhandledExceptionFilter,0_2_00007FF6DC92BD98
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC92C1EC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6DC92C1EC
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_00007FF6DC92BBFC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6DC92BBFC
                  Source: C:\Windows\System32\mmc.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A6330 OpenProcess,NtQuerySystemInformation,GetCurrentProcessId,CloseHandle,OutputDebugStringA,NtQuerySystemInformation,OpenProcess,OpenProcess,VirtualAllocEx,TerminateProcess,OpenProcess,WriteProcessMemory,WriteProcessMemory,LoadLibraryW,GetProcAddress,CreateRemoteThread,WaitForSingleObject,OutputDebugStringA,VirtualFreeEx,OutputDebugStringA,0_2_000001C0D26A6330
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetCurrentProcessId,OpenProcess,ReadProcessMemory,ReadProcessMemory,GetWindowsDirectoryW,GetModuleFileNameW,ReadProcessMemory,ReadProcessMemory,CloseHandle, \explorer.exe0_2_000001C0D26A70E0
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
                  Source: C:\Windows\System32\CompMgmtLauncher.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\system32\compmgmt.msc" /sJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A6120 cpuid 0_2_000001C0D26A6120
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: try_get_function,GetLocaleInfoW,0_2_000001C0D26BB420
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: EnumSystemLocalesW,0_2_000001C0D26C647C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: EnumSystemLocalesW,0_2_000001C0D26C654C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: GetLocaleInfoW,0_2_000001C0D26C6A38
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_000001C0D26C6B64
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: GetLocaleInfoW,0_2_000001C0D26C6830
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,wcschr,wcschr,GetLocaleInfoW,0_2_000001C0D26C6130
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_000001C0D26C6988
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_000001C0D26C65E4
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: EnumSystemLocalesW,0_2_000001C0D26BAF7C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: GetLocaleInfoW,0_2_00007FF6DC937E08
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: EnumSystemLocalesA,0_2_00007FF6DC928D50
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF6DC941E64
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: EnumSystemLocalesW,0_2_00007FF6DC941784
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF6DC9418EC
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: EnumSystemLocalesW,0_2_00007FF6DC941854
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: EnumSystemLocalesW,0_2_00007FF6DC93787C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: GetLocaleInfoW,0_2_00007FF6DC941B30
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: GetLocaleInfoW,0_2_00007FF6DC941D2C
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: TranslateName,TranslateName,IsValidCodePage,GetLocaleInfoW,0_2_00007FF6DC941478
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF6DC941C7C
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26ACFB8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_000001C0D26ACFB8
                  Source: C:\Users\user\Desktop\U02LaPwnkd.exeCode function: 0_2_000001C0D26A2630 SHGetFolderPathA,DeleteFileA,Wow64DisableWow64FsRedirection,RegOpenKeyExA,RegDeleteTreeA,OutputDebugStringA,RegDeleteTreeA,OutputDebugStringA,RegDeleteTreeA,OutputDebugStringA,RegCloseKey,Wow64RevertWow64FsRedirection,SHGetSpecialFolderPathA,DeleteFileA,DeleteFileA,GetUserNameA,DeleteFileA,DeleteFileA,DeleteFileA,VariantClear,OutputDebugStringA,CoUninitialize,VariantClear,0_2_000001C0D26A2630
                  Source: C:\Windows\System32\mmc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: U02LaPwnkd.exeBinary or memory string: kxetray.exe
                  Source: U02LaPwnkd.exeBinary or memory string: 360safe.exe
                  Source: U02LaPwnkd.exeBinary or memory string: 360Safe.exe
                  Source: U02LaPwnkd.exeBinary or memory string: 360tray.exe
                  Source: U02LaPwnkd.exeBinary or memory string: 360Tray.exe
                  Source: U02LaPwnkd.exeBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.U02LaPwnkd.exe.1c0d26506d1.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.U02LaPwnkd.exe.1c0d26a0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.U02LaPwnkd.exe.1c0d26a0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.U02LaPwnkd.exe.1c0d26506d1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.4477912347.000001C0D26A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4476822143.000001C0D2650000.00000010.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: U02LaPwnkd.exe PID: 4040, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.U02LaPwnkd.exe.1c0d26506d1.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.U02LaPwnkd.exe.1c0d26a0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.U02LaPwnkd.exe.1c0d26a0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.U02LaPwnkd.exe.1c0d26506d1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.4477912347.000001C0D26A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4476822143.000001C0D2650000.00000010.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: U02LaPwnkd.exe PID: 4040, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts2
                  Command and Scripting Interpreter
                  1
                  Scheduled Task/Job
                  1
                  Access Token Manipulation
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory11
                  Account Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts1
                  Scheduled Task/Job
                  Logon Script (Windows)121
                  Process Injection
                  2
                  Obfuscated Files or Information
                  Security Account Manager1
                  System Network Connections Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                  Scheduled Task/Job
                  1
                  DLL Side-Loading
                  NTDS3
                  File and Directory Discovery
                  Distributed Component Object ModelInput Capture1
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
                  Masquerading
                  LSA Secrets55
                  System Information Discovery
                  SSHKeylogging1
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts41
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials61
                  Security Software Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Access Token Manipulation
                  DCSync41
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job121
                  Process Injection
                  Proc Filesystem2
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585557 Sample: U02LaPwnkd.exe Startdate: 07/01/2025 Architecture: WINDOWS Score: 100 27 www.wshifen.com 2->27 29 www.baidu.com 2->29 31 2 other IPs or domains 2->31 41 Malicious sample detected (through community Yara rule) 2->41 43 Antivirus / Scanner detection for submitted sample 2->43 45 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->45 47 4 other signatures 2->47 8 U02LaPwnkd.exe 2 8 2->8         started        12 svchost.exe 1 1 2->12         started        14 CompMgmtLauncher.exe 3 1 2->14         started        signatures3 process4 dnsIp5 33 154.91.226.158, 49705, 5689 ITACE-AS-APItaceInternationalLimitedHK Seychelles 8->33 35 www.wshifen.com 103.235.47.188, 49704, 80 BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtd Hong Kong 8->35 49 Found evasive API chain (may stop execution after checking mutex) 8->49 51 Contains functionality to inject threads in other processes 8->51 53 Found evasive API chain checking for user administrative privileges 8->53 16 powershell.exe 38 8->16         started        19 WINWORD.EXE 117 81 8->19         started        37 127.0.0.1 unknown unknown 12->37 21 mmc.exe 12 15 14->21         started        signatures6 process7 signatures8 39 Loading BitLocker PowerShell Module 16->39 23 WmiPrvSE.exe 16->23         started        25 conhost.exe 16->25         started        process9

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.